kdynamo Secure Multimedia Device Programmer s Reference (COMMANDS) February 2018 Manual Part Number: D REGISTERED TO ISO 9001:2015

Size: px
Start display at page:

Download "kdynamo Secure Multimedia Device Programmer s Reference (COMMANDS) February 2018 Manual Part Number: D REGISTERED TO ISO 9001:2015"

Transcription

1 kdynamo Secure Multimedia Device Programmer s Reference (COMMANDS) February 2018 Manual Part Number: D REGISTERED TO ISO 9001:2015 Page 1 of 209 (D )

2 Copyright MagTek, Inc. Printed in the United States of America INFORMATION IN THIS PUBLICATION IS SUBJECT TO CHANGE WITHOUT NOTICE AND MAY CONTAIN TECHNICAL INACCURACIES OR GRAPHICAL DISCREPANCIES. CHANGES OR IMPROVEMENTS MADE TO THIS PRODUCT WILL BE UPDATED IN THE NEXT PUBLICATION RELEASE. NO PART OF THIS DOCUMENT MAY BE REPRODUCED OR TRANSMITTED IN ANY FORM OR BY ANY MEANS, ELECTRONIC OR MECHANICAL, FOR ANY PURPOSE, WITHOUT THE EXPRESS WRITTEN PERMISSION OF MAGTEK, INC. MagTek is a registered trademark of MagTek, Inc. MagnePrint is a registered trademark of MagTek, Inc. Magensa is a trademark of MagTek, Inc. MagneSafe is a trademark of MagTek, Inc. IntelliStripe is a registered trademark of MagTek, Inc. AAMVA is a trademark of AAMVA. American Express and EXPRESSPAY FROM AMERICAN EXPRESS are registered trademarks of American Express Marketing & Development Corp. D-PAYMENT APPLICATION SPECIFICATION is a registered trademark to Discover Financial Services CORPORATION MasterCard is a registered trademark and PayPass and Tap & Go are trademarks of MasterCard International Incorporated. Visa and Visa paywave are registered trademarks of Visa International Service Association. ANSI, the ANSI logo, and numerous other identifiers containing "ANSI" are registered trademarks, service marks, and accreditation marks of the American National Standards Institute (ANSI). ISO is a registered trademark of the International Organization for Standardization. PCI Security Standards Council is a registered trademark of the PCI Security Standards Council, LLC. EMVCo and EMV are trademarks of EMVCo and its licensors. UL and the UL logo are trademarks of UL LLC. The Bluetooth word mark and logos are registered trademarks owned by Bluetooth SIG, Inc. and any use of such marks by MagTek is under license. Apple Pay, iphone, ipod, and Mac are registered trademarks of Apple Inc., registered in the U.S. and other countries. App Store SM is a service mark of Apple Inc., registered in the U.S. and other countries. ipad and ipad mini are trademarks of Apple, Inc. IOS is a trademark or registered trademark of Cisco in the U.S. and other countries and is used by Apple Inc. under license. Microsoft and Windows are registered trademarks of Microsoft Corporation. All other system names and product names are the property of their respective owners. USB (Universal Serial Bus) Specification is Copyright 1998 Compaq Computer Corporation, Intel Corporation, Microsoft Corporation, NEC Corporation. Keyboard Usage Definitions content is taken from Universal Serial Bus HID Usage Tables, Version 1.12, Section 10, Keyboard/Keypad Page (0x07) USB Implementers Forum Modifier Byte Definitions content is taken from Section 8.3 Report Format for Array Items, Device Class Definition for Human Interface Devices (HID) Version 1.11, USB Implementers Forum, hidcomments@usb.org. Page 2 of 209 (D )

3 Table Revisions Rev Number Date Notes 10 Oct 6, 2017 Initial release based on D v72 Draft 20 Feb 9, 2018 Add cdynamo, Dynamag Duo; Add Property 0x6D - EMV Contact Notification Configuration (Contact Only); Modify Property 0x33 - Card Inserted (MSR Insert Contact Only); Multiple clarifications to Masked Track Data and Identifying ISO/ABA and AAMVA Cards For Masking (MSR Only), including Service Code unmasked info; Change insert a card swipe a card and tap a card to present payment (reviewed by EL and HM); Tag relevant features and values as Only Contact / Online; Retrofit Unattended Operation feature, notably in Command Group 0x03 - EMV L2 (EMV Only, Extended Commands Only), Command Group 0x03 (Cont.) - EMV L2 Configuration (EMV Only, Extended Commands Only); Update device defaults in Property 0x10 - Interface Type; Add tdynamo, kdynamo, mdynamo Contactless; Major rewrite to streamline and add to Table 1-2; Add Extended Command 0x Modify Dynamic Reader Limits Configuration (MAC, Extended Commands Only, Contactless Only) and Extended Command 0x Read Dynamic Reader Limits Configuration (Extended Commands Only, Contactless Only); Add options in Extended Command 0x030B - Read EMV Kernel Information (EMV Only, Extended Commands Only) to retrieve contactless kernel version, checksum, and configuration info; Add C.4 Contactless Magnetic Stripe Data (MSD) Tags (Contactless Only) and Appendix D EMV Factory Defaults (EMV Only); Clarify forming DSN in Command Group 0x03 (Cont.) - EMV L2 Configuration (EMV Only, Extended Commands Only); Correct example in Extended Command 0x Modify EMV Configuration (MAC, Contact Only, Extended Commands Only); Compare, reconcile, merge contents of D , missed during original master merge, including Command 0xA0 - Enable / Disable MSR Output (MSR Disable Only) and data types in section 6; Retrofit filtering out of properties by SureSwipe feature; Update contactless statuses in Notification 0x Transaction Status / Progress Information; Large update to Table Device Features; Update examples in Extended Command 0x Modify Terminal Configuration (MAC, EMV Only, Extended Commands Only), Extended Command 0x Modify Application Configuration (MAC, EMV Only, Extended Commands Only) and Extended Command 0x Modify Dynamic Reader Limits Configuration (MAC, Extended Commands Only, Contactless Only); Add Quick Chip Page 3 of 209 (D )

4 Rev Number Date Notes option in Extended Command 0x Initiate EMV Transaction (EMV Only, Extended Commands Only); Add tag 9F40 in Extended Command 0x Read EMV Configuration (Contact Only, Extended Commands Only); Update available configurations in Extended Command 0x Modify EMV Configuration (MAC, Contact Only, Extended Commands Only), Extended Command 0x Read EMV Configuration (Contact Only, Extended Commands Only); Add Command 0x58 - Set Head Subsystem Power State and Property 0x70 - Head Subsystem Power State Default; Extract tags common to all EMV databases into D.1 EMV Common Settings; Major clarity rewrite of introduction to EMV transactions in section 8.3; Remove legacy original format for EMV messages and merge EMV message formats under a single Appendix C; Separate iap1 from iap2 connection type; Misc. clarifications and corrections Page 4 of 209 (D )

5 LIMITED WARRANTY MagTek warrants that the products sold pursuant to this Agreement will perform in accordance with MagTek s published specifications. This warranty shall be provided only for a period of one year from the date of the shipment of the product from MagTek (the Warranty Period ). This warranty shall apply only to the Buyer (the original purchaser, unless that entity resells the product as authorized by MagTek, in which event this warranty shall apply only to the first repurchaser). During the Warranty Period, should this product fail to conform to MagTek s specifications, MagTek will, at its option, repair or replace this product at no additional charge except as set forth below. Repair parts and replacement products will be furnished on an exchange basis and will be either reconditioned or new. All replaced parts and products become the property of MagTek. This limited warranty does not include service to repair damage to the product resulting from accident, disaster, unreasonable use, misuse, abuse, negligence, or modification of the product not authorized by MagTek. MagTek reserves the right to examine the alleged defective goods to determine whether the warranty is applicable. Without limiting the generality of the foregoing, MagTek specifically disclaims any liability or warranty for goods resold in other than MagTek s original packages, and for goods modified, altered, or treated without authorization by MagTek. Service may be obtained by delivering the product during the warranty period to MagTek (1710 Apollo Court, Seal Beach, CA 90740). If this product is delivered by mail or by an equivalent shipping carrier, the customer agrees to insure the product or assume the risk of loss or damage in transit, to prepay shipping charges to the warranty service location, and to use the original shipping container or equivalent. MagTek will return the product, prepaid, via a three (3) day shipping service. A Return Material Authorization ( RMA ) number must accompany all returns. Buyers may obtain an RMA number by contacting MagTek Support Services at (888) EACH BUYER UNDERSTANDS THAT THIS MAGTEK PRODUCT IS OFFERED AS IS. MAGTEK MAKES NO OTHER WARRANTY, EXPRESS OR IMPLIED, AND MAGTEK DISCLAIMS ANY WARRANTY OF ANY OTHER KIND, INCLUDING ANY WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. IF THIS PRODUCT DOES NOT CONFORM TO MAGTEK S SPECIFICATIONS, THE SOLE REMEDY SHALL BE REPAIR OR REPLACEMENT AS PROVIDED ABOVE. MAGTEK S LIABILITY, IF ANY, SHALL IN NO EVENT EXCEED THE TOTAL AMOUNT PAID TO MAGTEK UNDER THIS AGREEMENT. IN NO EVENT WILL MAGTEK BE LIABLE TO THE BUYER FOR ANY DAMAGES, INCLUDING ANY LOST PROFITS, LOST SAVINGS, OR OTHER INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OF, OR INABILITY TO USE, SUCH PRODUCT, EVEN IF MAGTEK HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES, OR FOR ANY CLAIM BY ANY OTHER PARTY. LIMITATION ON LIABILITY EXCEPT AS PROVIDED IN THE SECTIONS RELATING TO MAGTEK S LIMITED WARRANTY, MAGTEK S LIABILITY UNDER THIS AGREEMENT IS LIMITED TO THE CONTRACT PRICE OF THIS PRODUCT. MAGTEK MAKES NO OTHER WARRANTIES WITH RESPECT TO THE PRODUCT, EXPRESSED OR IMPLIED, EXCEPT AS MAY BE STATED IN THIS AGREEMENT, AND MAGTEK Page 5 of 209 (D )

6 DISCLAIMS ANY IMPLIED WARRANTY, INCLUDING WITHOUT LIMITATION ANY IMPLIED WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. MAGTEK SHALL NOT BE LIABLE FOR CONTINGENT, INCIDENTAL, OR CONSEQUENTIAL DAMAGES TO PERSONS OR PROPERTY. MAGTEK FURTHER LIMITS ITS LIABILITY OF ANY KIND WITH RESPECT TO THE PRODUCT, INCLUDING ANY NEGLIGENCE ON ITS PART, TO THE CONTRACT PRICE FOR THE GOODS. MAGTEK S SOLE LIABILITY AND BUYER S EXCLUSIVE REMEDIES ARE STATED IN THIS SECTION AND IN THE SECTION RELATING TO MAGTEK S LIMITED WARRANTY. FCC WARNING STATEMENT This equipment has been tested and was found to comply with the limits for a Class B digital device pursuant to Part 15 of FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a residential environment. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference with radio communications. However, there is no guarantee that interference will not occur in a particular installation. FCC COMPLIANCE STATEMENT This device complies with Part 15 of the FCC Rules. Operation of this device is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. CANADIAN DOC STATEMENT This digital apparatus does not exceed the Class B limits for radio noise from digital apparatus set out in the Radio Interference Regulations of the Canadian Department of Communications. Le présent appareil numérique n émet pas de bruits radioélectriques dépassant les limites applicables aux appareils numériques de la classe B prescrites dans le Réglement sur le brouillage radioélectrique édicté par le ministère des Communications du Canada. This Class B digital apparatus complies with Canadian ICES-003. Cet appareil numérique de la classe B est conformé à la norme NMB-003 du Canada. CE STANDARDS Testing for compliance with CE requirements was performed by an independent laboratory. The unit under test was found compliant with standards established for Class B devices. UL/CSA This product is recognized per Underwriter Laboratories and Canadian Underwriter Laboratories ROHS STATEMENT When ordered as RoHS compliant, this product meets the Electrical and Electronic Equipment (EEE) Reduction of Hazardous Substances (RoHS) European Directive 2002/95/EC. The marking is clearly recognizable, either as written words like Pb-free, lead-free, or as another clear symbol ( ). Page 6 of 209 (D )

7 0 - Table of Contents Table of Contents LIMITED WARRANTY... 5 FCC WARNING STATEMENT... 6 FCC COMPLIANCE STATEMENT... 6 CANADIAN DOC STATEMENT... 6 CE STANDARDS... 6 UL/CSA... 6 RoHS STATEMENT... 6 Table of Contents Introduction About This Document About SDKs About Terminology About Connections and Data Formats About Device Features Connection Types How to Use Apple 30-Pin and Lightning Connections (30-pin, Lightning) Data Formats How to Use SLIP Format (SLIP Only) Magnetic Stripe Card Data and Notifications In SLIP Format How to Send Commands In SLIP Format Security Levels About Message Authentication Codes (MAC) Security Level Security Level Security Level 4 (MSR Only) Command Behaviors By Security Level Encryption, Decryption, and Key Management Determining Key Decrypting Data Magnetic Stripe Card Data Sent from Device to Host (MSR Only Keypad Entry Only) About Track Data Track 1 Decode Status (HID, TLV, GATT, SLIP) Track 2 Decode Status (HID, TLV, GATT, SLIP) Track 3 Decode Status (HID, TLV, GATT, SLIP, 3-Track Only) Card Encode Type (HID, TLV, GATT, SLIP) Device Encryption Status Encrypted Track Data Track 1 Encrypted Data Length (HID, GATT, SLIP) Page 7 of 209 (D )

8 0 - Table of Contents Track 2 Encrypted Data Length (HID, GATT, SLIP) Track 3 Encrypted Data Length (HID, GATT, SLIP, 3-Track Only) Track 1 Absolute Data Length (HID, GATT, SLIP) Track 2 Absolute Data Length (HID, GATT, SLIP) Track 3 Absolute Data Length (HID, GATT, SLIP, 3-Track Only) Track 1 Encrypted Data Track 2 Encrypted Data Track 3 Encrypted Data MagnePrint Status MagnePrint Data Length (HID, GATT, SLIP) MagnePrint Absolute Data Length (HID, TLV, GATT, SLIP) Encrypted MagnePrint Data Device Serial Number Masked Track Data Track 1 Masked Data Length (HID, GATT, SLIP) Track 2 Masked Data Length (HID, GATT, SLIP) Track 3 Masked Data Length (HID, GATT, SLIP, 3-Track Only) Track 1 Masked Data Track 2 Masked Data Track 3 Masked Data (3-Track Only) Encrypted Session ID DUKPT Key Serial Number (KSN) Remaining MSR Transactions MagneSafe Version Number (HID, GATT, SLIP) HID Report Version (HID, GATT, SLIP) MagnePrint KSN (HID, TLV, GATT, SLIP) Battery Level (HID, GATT, SLIP) Notification Messages Sent from Device to Host (Extended Notifications Only) About Notification Mesages Notification Group 0x03 - EMV L2 (EMV Only) Notification 0x Transaction Status / Progress Information Notification 0x Display Message Request Notification 0x User Selection Request (Contact Only) Notification 0x ARQC Message Notification 0x Transaction Result Message Commands About Result Codes General Commands Command 0x00 - Get Property Page 8 of 209 (D )

9 0 - Table of Contents Command 0x01 - Set Property (MAC) Command 0x02 - Reset Device (MAC) Command 0x09 - Get Current TDES DUKPT KSN Command 0x0A - Set Session ID (MSR Only) Command 0x10 - Activate Authenticated Mode (MSR Only) Command 0x11 - Activation Challenge Response (MSR Only) Command 0x12 - Deactivate Authenticated Mode (MSR Only) Command 0x14 - Get Device State (MSR Only) Command 0x15 - Get / Set Security Level (MAC) Command 0x1C - Get Remaining MSR Transactions Counter (MSR Only) Command 0x45 - Get Battery Percentage (PM3, PM4, PM5, PM6) Command 0x49 - Send Extended Command Packet (Extended Commands) Command 0x4A - Get Extended Response (Extended Commands) Command 0x58 - Set Head Subsystem Power State (PM5) Command 0xA0 - Enable / Disable MSR Output (MSR Disable Only) Command Group 0x03 - EMV L2 (EMV Only, Extended Commands Only) About EMV L2 Transaction Flows (EMV Only) Extended Command 0x Initiate EMV Transaction (EMV Only, Extended Commands Only) Extended Command 0x User Selection Result (Contact Only, Extended Commands Only) Extended Command 0x Online Processing Result / Acquirer Response (EMV Only, Extended Commands Only) Extended Command 0x Cancel Transaction (EMV Only, Extended Commands Only) Command Group 0x03 (Cont.) - EMV L2 Configuration (EMV Only, Extended Commands Only) Extended Command 0x Modify Terminal Configuration (MAC, EMV Only, Extended Commands Only) Extended Command 0x Read Terminal Configuration (EMV Only, Extended Commands Only) Extended Command 0x Modify Application Configuration (MAC, EMV Only, Extended Commands Only) Extended Command 0x Read Application Configuration (EMV Only, Extended Commands Only) Extended Command 0x030B - Read EMV Kernel Information (EMV Only, Extended Commands Only) Extended Command 0x030C - Set Date and Time (MAC, EMV Only, Extended Commands Only) Extended Command 0x030D - Read Date and Time (EMV Only, Extended Commands Only) 97 Page 9 of 209 (D )

10 0 - Table of Contents Extended Command 0x030E - Commit Configuration (EMV Only, Extended Commands Only) Extended Command 0x Modify EMV Configuration (MAC, Contact Only, Extended Commands Only) Extended Command 0x Read EMV Configuration (Contact Only, Extended Commands Only) Extended Command 0x Modify Dynamic Reader Limits Configuration (MAC, Extended Commands Only, Contactless Only) Extended Command 0x Read Dynamic Reader Limits Configuration (Extended Commands Only, Contactless Only) Properties About Properties Property 0x00 - Firmware ID Property 0x03 - Device Serial Number Property 0x04 - MagneSafe Version Number Property 0x05 - Track ID Enable (MSR Only) Property 0x07 - ISO Track Mask (MSR Only) Property 0x08 - AAMVA Track Mask (MSR Only) Property 0x10 - Interface Type Property 0x15 - MagnePrint Flags (HID, Streaming, MSR Only) Property 0x31 - Mask Other Cards (MSR Only) Property 0x33 - Card Inserted (MSR Insert Contact Only) Property 0x34 - Send Clear AAMVA Card Data (MSR Only) Property 0x3A - Firmware ID 2 (Proprietary Wireless Embedded V5 Head) Property 0x54 - Card Data Encryption Variant (MSR Only, Configurable MSR Variants Only) Property 0x56 - MagnePrint Data Encryption Variant (MSR Only, Configurable MagnePrint Variants Only) Property 0x67 - EMV Data Encryption Variant (EMV Only) Property 0x68 - EMV Message Format (EMV Only) Property 0x6D - EMV Contact Notification Configuration (Contact Only) Property 0x70 - Head Subsystem Power State Default (PM5) Appendix A Examples A.1 Command Examples A.1.1 Example: Changing from Security Level 2 to Security Level A.1.2 Example: Changing from Security Level 2 to Security Level 4 (MSR Only) A.1.3 Example: Changing from Security Level 3 to Security Level 4 (MSR Only) A.1.4 Example: Authentication (MSR Only) A.2 About the SDKs and Additional Examples Appendix B Identifying ISO/ABA and AAMVA Cards For Masking (MSR Only) B.1 ISO/ABA Financial Card B.2 AAMVA Driver s License Page 10 of 209 (D )

11 0 - Table of Contents Appendix C EMV Message Formats (EMV Only) C.1 ARQC Messages (EMV Only) C.2 ARPC Response (from Online Processing) (EMV Only) C.3 Transaction Result Messages (EMV Only) C.4 Contactless Magnetic Stripe Data (MSD) Tags (Contactless Only) Appendix D EMV Factory Defaults (EMV Only) D.1 EMV Common Settings D.1.1 EMV Common Terminal Settings and Defaults D.1.2 EMV Common Application Settings and Defaults D.2 EMV Contact Settings (Contact Only) D.2.1 EMV Contact Terminal Settings and Defaults (Contact Only) D.2.2 EMV Contact Application Settings and Defaults (Contact Only) D.3 MCL Settings (Contactless Only) D.3.1 MCL Terminal Settings and Defaults (Contactless Only) D.3.2 MCL Application Settings and Defaults (Contactless Only) D.4 paywave Settings (Contactless Only) D.4.1 paywave Terminal Settings and Defaults (Contactless Only) D.4.2 paywave Application Settings and Factory Defaults (Contactless Only) D.4.3 paywave Dynamic Reader Limit Settings and Defaults (Contactless Only) D.5 Expresspay Settings (Contactless Only) D.5.1 Expresspay Terminal Settings and Defaults (Contactless Only) D.5.2 Expresspay Application Settings and Defaults (Contactless Only) D.5.3 Expresspay Dynamic Reader Limit Settings and Defaults (Contactless Only) D.6 D-PAS Settings (Contactless Only) D.6.1 D-PAS Terminal Settings and Defaults D.6.2 D-PAS Application Settings and Factory Defaults Page 11 of 209 (D )

12 1 - Introduction 1 Introduction 1.1 About This Document This document describes how to communicate with Secure Card Reader Authenticator (SCRA) devices which implement MagneSafe V About SDKs MagTek provides convenient SDKs and corresponding documentation for many programming languages and operating systems. The API libraries included in the SDKs wrap the details of the connection in an interface that conceptually parallels the device s internal operation, freeing software developers to focus on the business logic, without having to deal with the complexities of platform APIs for connecting to the various available connection types, communicating using the various available protocols, and parsing the various available data formats. Information about using MagTek APIs is available in separate documentation, including D Secure Card Reader Authenticator API PROGRAMMING REFERENCE MANUAL. The SDKs and corresponding documentation include: Functions for sending the direct commands described in this manual Wrappers for commonly used commands that further simplify development Sample source code to demonstrate how to communicate with the device using the direct commands described in this manual To download the SDKs and documentation, search for SDK and select the SDK and documentation for the programming languages and platforms you need, or contact MagTek Support Services for assistance. Software developers also have the option to revert to direct communication with the device using libraries available in the chosen development framework. For example, custom software written in Visual Basic or visual C++ may make API calls to the standard Windows USB HID driver. This document provides information and support for developing host software using that method. MagTek has also developed software that demonstrates direct communication with the device, which software developers can use to test the device and to which provides a starting point for developing other software. For more information, see the MagTek web site, or contact your reseller or MagTek Support Services. 1.3 About Terminology The general terms device and host are used in different, often incompatible ways in a multitude of specifications and contexts. For example, host may have different a meaning in the context of USB communication than in the context of networked financial transaction processing. In this document, device and host are used strictly as follows: Device refers to the Secure Card Reader Authenticator (SCRA) that receives and responds to the command set specified in this document. Devices include Dynamag, edynamo, and so on. Host refers to the piece of general-purpose electronic equipment the device is connected or paired to, which can send data to and receive data from the device. Host types include PC and Mac computers/laptops, tablets, smartphones, teletype terminals, and even test harnesses. In many cases the host may have custom software installed on it that communicates with the device. When host must be used differently, it is qualified as something specific, such as acquirer host or USB host. Page 12 of 209 (D )

13 1 - Introduction Similarly, the word user is used in different ways in different contexts. This document separates users into more descriptive categories: The cardholder The operator (such as a cashier, bank teller, customer service representative, or server), and The developer or the administrator (such as an integrator configuring the device for the first time). Because some connection types, payment brands, and other vocabulary name spaces (notably Bluetooth LE, EMV, smart phones, and more recent versions of Windows) use very specific meanings for the term Application, this document favors the term software to refer to software on the host that provides a user interface for the operator. The combination of device(s), host(s), software, firmware, configuration settings, physical mounting and environment, user experience, and documentation is referred to as the solution. Page 13 of 209 (D )

14 1 - Introduction 1.4 About Connections and Data Formats MagneSafe V5 products transmit data using a set of common data formats across a variety of physical connection layers, which can include universal serial bus (USB) acting as a keyboard ( USB KB ), USB acting as a vendor-defined HID device ( USB HID ), RS-232, Apple Lightning, bidirectional audio connectors, Bluetooth, Bluetooth LE, and so on. The set of available physical connection types and the data formats available on each connection type is device-dependent. Table 1-1 shows the physical connection types available on each product, and the data formats supported on each connection type for that device. Details about connection types and formats can be found in section 2 Connection Types and section 3 Data Formats. Section headings in this document include tags that indicate which connection types and/or data formats they apply to. Table Device Connection Types / Data Formats Product BulleT KB BulleT SPP cdynamo Dynamag, Dynamag Duo, USB Enc IntelliHead V5 30-pin iap1 Audio Blueto oth LE GATT Bluetooth LE GATT KB Bluetooth Streaming (MSR data) Streaming Lightning iap1 Streaming Lightning iap2 RS-232 / UART Dynasty GATT Streaming HID DynaMAX GATT Streaming HID SPI USB HID HID HID USB KB Streaming DynaPAD HID Streaming edynamo GATT HID Flash idynamo Streaming HID Proprietary Wireless idynamo 5 Streaming Home Banking kdynamo SLIP Page 14 of 209 (D )

15 1 - Introduction Product mdynamo mdynamo Contactless Module P-series and I-65 w/v5 30-pin iap1 Audio Blueto oth LE GATT Bluetooth LE GATT KB Bluetooth Lightning iap1 Lightning iap2 RS-232 / UART pdynamo GATT HID sdynamo SPI Enc IntelliHead V5 Streaming SPI Streaming tdynamo GATT HID UART Enc IntelliHead V5 Streaming udynamo TLV HID USB HID HID HID HID USB KB Streaming Proprietary Wireless Page 15 of 209 (D )

16 1 - Introduction 1.5 About Device Features The information in this document applies to multiple devices. When developing solutions that use a specific device or set of devices, integrators must be aware of each device s connection types, data formats, features, and configuration options, which affect the availability and behavior of some commands. Table 1-2 provides a list of device features that may impact command availability and behavior. All section headings in this document include tags that indicate which features they apply to. Table Device Features Product BulleT KB BulleT SPP MSR Swipe MSR Insert MSR 3 Tracks MSR Disable MSR Swap Tracks 1/3 Embedded V5 Head Conf. MSR Variants Conf. MP Variants SHA-1 SHA-256 Conf. SHA SureSwipe JIS Capable Mask Service Code MagneSafe 2.0 EMV Contact EMV Contactless EMV Offline ODA EMV MSR Flow Keypad Entry Fixed Key Y N Y N N N N N N N N N N N PM1 N N N N N N N N N N N N N 120b cdynamo Y N Y Y N N Y N N N N N Y N N N N N N N N N/A N N N N N N N N N Y N N N 120b Dynamag, Dynamag Duo, USB Enc IntelliHead V5 Y N Y N Y N Y N Y N N Y N N N N N N N N N N/A N N N N N N N N N N N N N 24b Dynasty Y N Y N N Y Y Y Y N N N N Y Y N N N Y PM3 N N N Y N N Y Y Y N N Y 120b DynaMAX Y N Y N N N Y Y Y N Y Y N N N N N N N N Y PM2 N N N N N N N N N N N N N 24b DynaPAD Y N N N N N Y N Y N N N N N N Y N N N/A N N N Y N N N N N N N N N N edynamo Y N Y N N N Y Y Y N Y Y N N Y N Y N N N Y PM3 Y N N N N N Y Y Y Y N N N Y 24b Flash Y N Y N N N N N N N N N N N N N N PM1 N Y N N N N N N N N N N N 88b idynamo Y N N N N N N N N N N N N N N/A N N N N N N N N N N N N N 120b idynamo 5 Y N Y Y N N Y N N N N N Y N N N N N N N N N/A N N N N N N N N N N N N N 120b Home Banking (Dynamo LCD) Y N N N N N N N N N N N N N/A N Y * Y N N N N N N N N 24b Secondary DUKPT Key Power Management Battery-Backed RTC Unattended Mode Store/Forward Transaction Validation Display Custom Messages Multi-Language Tamper Extended Commands Extended Notifications Pairing Modes Conf. Lightning FID Auxiliary Ports External LED Custom Advertising Encrypt Bulk Data Page 16 of 209 (D )

17 1 - Introduction Product MSR Swipe MSR Insert MSR 3 Tracks MSR Disable MSR Swap Tracks 1/3 Embedded V5 Head Conf. MSR Variants Conf. MP Variants SHA-1 SHA-256 Conf. SHA SureSwipe JIS Capable Mask Service Code MagneSafe 2.0 EMV Contact EMV Contactless EMV Offline ODA kdynamo Y N Y Y N Y Y Y N N N N N N N Y Y N Y N N N PM5 N N N N N N N Y Y N Y N N N N mdynamo N N N N N N Y Y N N N N N N Y N Y N N Y Y N/A N N N N N N N Y Y N N Y Y 1 N 24b mdynamo Contactless Module P-series and I-65 w/v5 EMV MSR Flow Keypad Entry N N N N N N Y Y N N N N N N N Y N N N N Y N/A N Y N N N N N Y Y N N N N N N N Y Y N N N N Y N N N N N N N N N N/A N N N N N N N N N N N N N N pdynamo Y N Y N N N Y Y Y N N N N N N N N N N Y PM6 N N N Y N N N N Y N N Y N sdynamo Y N Y Y N Y Y N N N N N Y N N N N N N N N N/A N N N N N N N N N N N N N N SPI Encrypting IntelliHead V5 Fixed Key Y N Y N N N N Y 2 N N N N N N N N/A N N N N N N N N N N N N N 120b tdynamo Y N Y Y N Y Y Y N N N Y N N N Y Y N Y N N Y PM5 N Y N N N N N Y Y N N N N N N UART Enc IntelliHead V5 Y N Y N N N N N N N N N N N N N/A N N N N N N N N N N N N N 120b udynamo Y N N N N N N N N N N N N Y PM4 N N N N N N N N N N N N N 24b 1) This feature is available on mdynamo in firmware revisions D00 (released August 2017) and later. 2) This feature is not supported by all products; it was introduced in the SPI Encrypting IntelliHead with V5, firmware version C01 released in July Secondary DUKPT Key Power Management Battery-Backed RTC Unattended Mode Store/Forward Transaction Validation Display Custom Messages Multi-Language Tamper Extended Commands Extended Notifications Pairing Modes Conf. Lightning FID Auxiliary Ports External LED Custom Advertising Encrypt Bulk Data Page 17 of 209 (D )

18 2 - Connection Types 2 Connection Types Table 1-1 on page 14 includes a list of connection types available for each device. The following subsections provide details developers will need to communicate with the device using each connection type. 2.1 How to Use Apple 30-Pin and Lightning Connections (30-pin, Lightning) This section provides information about developing an ios app that needs to communicate with the device via the 30-pin dock connector or Lightning connector using ipod Accessory Protocol (iap). To develop host software that connects to the device, you must know the following device properties, which are specified by the purchaser when ordering, and loaded by the manufacturer: BundleSeedIDString, which is a 10-character string assigned by Apple, Inc. to the host software developer protocolstring, also known as the SDK Protocol, usually in the form of a reverse DNS string unique to the host software developer or the device purchaser. The host software project must include the protocolstring in its.plist file before compiling. Spelling, including punctuation and capitalization, must exactly match the protocolstring of the device. The host software should initiate a connection to the device using the ios SDK s ExternalAccessory framework, and upon establishing the connection, can begin exchanging data with the device. Devices may use different formats to send and receive different types of data on different connections, or may change their behavior based on configuration. To determine the data format to use, look up the device and connection type in Table 1-1. For details about using SLIP format, see section 3.1 How to Use SLIP Format. On some devices, code upgrade commands are not available through this connection. Page 18 of 209 (D )

19 3 - Data Formats 3 Data Formats 3.1 How to Use SLIP Format (SLIP Only) When the host and device exchange data using SLIP format, all messages are composed of a series of hexadecimal values encoded as two readable ASCII characters ( 0 through F only) per byte. The SLIP format is defined in Part D, Section 3 of Specification of the Bluetooth System, Host Controller Interface, Volume 4, which is available at Note the reference to bluetooth.org is intentional, and the specification does indeed apply to other device connection types. Host software should begin and end commands with SLIP s frame delimiter C0, and must take into account SLIP escape sequences that deal with occurrences of C0 inside the SLIP data frame: If outbound data contains the byte value C0, software should encode it into SLIP as DB DC; if inbound SLIP data contains the byte sequence DB DC, software should decode it to C0. If outbound data contains the byte value DB, software should encode it into SLIP as DB DD; if inbound SLIP data contains the byte sequence DB DD, software should decode it to DB. The data size for command data and card data may increase with firmware updates, so the host software should be able to adapt to this. Adapting can be as simple as ignoring any extra data bytes that are not understood or expected Magnetic Stripe Card Data and Notifications In SLIP Format When using SLIP format, the device may send Magnetic Stripe Card Data Sent from Device to Host (MSR Only Keypad Entry Only) or Notification Messages Sent from Device to Host (Extended Notifications Only) in either normal or Run-Length Encoded (RLE) compressed format, depending on whether RLE would help compress the data or not. The host software should understand both formats. The first byte of the incoming message is a message format field, which indicates what type of data the device is sending and whether the data is RLE compressed, as follows: 0x00 = Card Data Normal, which indicates the card data payload contains uncompressed card data in USB HID vendor defined report format (see section 6 Magnetic Stripe Card Data Sent from Device to Host). 0x01 = Card Data RLE, which indicates the card data payload contains run-length-encoded compressed card data in USB HID vendor-defined report format (see section 6 Magnetic Stripe Card Data Sent from Device to Host and the information below about RLE decoding). 0x02 = Notification Normal, which indicates the payload contains an uncompressed notification message [see section 7 Notification Messages Sent from Device to Host (Extended Notifications Only)]. 0x03 = Notification RLE, which indicates the payload contains a run-length-encoded compressed notification message [see section 7 Notification Messages Sent from Device to Host (Extended Notifications Only) and the information below about RLE decoding]. The device implements RLE as follows: 1) Any byte that is repeated more than once consecutively is run length encoded. Bytes that are not repeated stay as-is. 2) Repeated bytes are run-length encoded by repeating the byte twice, followed by the number of times the byte was repeated in the original data. Page 19 of 209 (D )

20 3 - Data Formats 3) The maximum length of an encoded run is 255, so runs larger than 255 bytes are encoded as multiple runs of 255 bytes each until the last run. For example, the data 0x44 0x55 0x55 0x55 0x55 0x55 0x55 0x55 0x55 0x055 0x66 0x00 0x00 is encoded as 0x44 0x55 0x55 0x09 0x66 0x00 0x00 0x02. A run of 260 0x00 bytes would be encoded as 0x00 0x00 0xFF 0x00 0x00 0x05. The second and third byte of card data contain the uncompressed data payload field size in big endian order. The fourth byte onward contains the data for the Magnetic Stripe Card Data Sent from Device to Host or Notification Messages Sent from Device to Host (Extended Notifications Only). Notification Messages Sent from Device to Host (Extended Notifications Only) are wrapped in the following block: Table SLIP Format Notification Wrapper Byte 0 Bit Bytes 1..n Byte n+1 0xC0 = SLIP frame delimiter Notification as defined in section 7 Notification Messages Sent from Device to Host (Extended Notifications Only) 0xC0 = SLIP frame delimiter How to Send Commands In SLIP Format When the device and host are using SLIP format for commands and responses, the host software should wrap all commands in the following block: Table SLIP Format Command Wrapper Byte 0 Bit Bytes 1..n Byte n+1 0xC0 = SLIP frame delimiter Command as defined in section 8 Commands 0xC0 = SLIP frame delimiter The device wraps all responses in the following block: Table SLIP Format Response Wrapper Byte 0 Bit Bytes 1..n Byte n+1 0xC0 = SLIP frame delimiter Response as defined in section 8 Commands. 0xC0 = SLIP frame delimiter Page 20 of 209 (D )

21 4 - Security Levels 4 Security Levels Devices can be configured to operate at different Security Levels, which affects Magnetic Stripe Card Data Sent from Device to Host (MSR Only Keypad Entry Only), the host software s ability to modify Properties, and the host software s ability to execute certain Commands. This section provides details about how the different security levels affect the device s behavior. Most MagneSafe devices support three Security Levels: Level 2, Level 3, and Level 4. The Security Level can be increased by sending commands to the device, but can never be decreased. 4.1 About Message Authentication Codes (MAC) Commands in this manual that are tagged MAC are privileged commands. If the device is set to a Security Level higher than 2 (see section 4 Security Levels), the host software must calculate and append a four-byte Message Authentication Code ( MAC ) to the Data field of the message, extending the length of the field by 4 bytes, to prove the sender is authorized to execute that command. The host software should calculate the MAC per ISO , MAC Algorithm 3, Padding Method 1. Data supplied to the MAC algorithm should be provided in raw binary form, not converted to ASCII-hexadecimal. The MAC key to be used is as specified in ANSI X9.24 Part 1, Appendix A ( Request PIN Entry 2 bullet 2). The host should use the current DUKPT KSN (which can be retrieved using Command 0x09 - Get Current TDES DUKPT KSN) to get a reference to the MAC key. Upon successfully completing any MACed command, the device advances the DUKPT Key. If a MAC is required but not present or incorrect, the device returns 0x Security Level 2 Security Level 2 is the least secure mode. In this mode, keys are loaded but the device does not require the host software to use them for most operations: Keys are used/needed to load new keys and to move to Security Level 3 or 4, but all other properties and commands are freely usable. The host can use Command 0x15 - Get / Set Security Level (MAC) to determine the device s current security level. 4.3 Security Level 3 Security Level 3 enables encryption of track data, MagnePrint data, and the Session ID. MagnePrint data is always included and always encrypted. At Security Level 3, many commands require security; most notably Command 0x01 - Set Property (MAC). See section 4.1 About Message Authentication Codes (MAC) for details. The host can use Command 0x15 - Get / Set Security Level (MAC) to determine the device s current security level. 4.4 Security Level 4 (MSR Only) When the device is at Security Level 4, the device requires the host to successfully complete an Authentication Sequence before it will transmit data from a card swipe (see section Command 0x10 - Activate Authenticated Mode). Correctly executing the Authentication Sequence also causes the green LED to blink, alerting the operator that the device is being controlled by a host with knowledge of the keys that is, an Authentic Host. The host can use Command 0x15 - Get / Set Security Level (MAC) to determine the device s current security level. 4.5 Command Behaviors By Security Level Table 4-1 shows the commands that are affected by the device s security level. Commands that are not affected by the security level are not listed. The key is as follows: Y means the command can run at the specified security level. N means the command is prohibited at the specified security level. Page 21 of 209 (D )

22 4 - Security Levels S means the command is secured [may require MACing, see section 4.1 About Message Authentication Codes (MAC)]. X* indicates Command 0x02 - Reset Device has special behavior. If an Authentication sequence has failed, only a correctly MACed Command 0x02 - Reset Device (MAC) can be used to reset the device. This is to prevent a dictionary attack on the keys and to minimize a denial of service (DoS) attack. Table Command Behaviors At Each Security Level Command Level 2 Level 3 Level 4 Any command not listed in this table functions the same at Security Level 2, Security Level 3, and Security Level 4. Y Y Y Command 0x01 - Set Property (MAC) Y S S Command 0x02 - Reset Device (MAC) Y X* X* Command 0x10 - Activate Authenticated Mode N Y Y Command 0x11 - Activation Challenge Response N Y Y Command 0x12 - Deactivate Authenticated Mode N Y Y Command 0x15 - Get / Set Security Level (MAC) S S S Extended Command 0x Initiate EMV Transaction (EMV Only, Extended Commands Only) Extended Command 0x User Selection Result (Contact Only, Extended Commands Only) Extended Command 0x Online Processing Result / Acquirer Response (EMV Only, Extended Commands Only) Extended Command 0x Cancel Transaction (EMV Only, Extended Commands Only) Extended Command 0x Modify Terminal Configuration (MAC, EMV Only, Extended Commands Only) Extended Command 0x Modify Application Configuration (MAC, EMV Only, Extended Commands Only) Extended Command 0x030C - Set Date and Time (MAC, EMV Only, Extended Commands Only) Extended Command 0x030E - Commit Configuration (EMV Only, Extended Commands Only) Extended Command 0x Modify EMV Configuration (MAC, Contact Only, Extended Commands Only) N Y Y N Y Y N Y Y N Y Y N S S N S S N S S N Y Y N S S Page 22 of 209 (D )

23 5 - Encryption, Decryption, and Key Management 5 Encryption, Decryption, and Key Management Some data exchanged between the device and the host is encrypted. This includes Encrypted Track Data, Encrypted MagnePrint Data, Encrypted Session ID, and parts of the ARQC Messages (EMV Only) and Transaction Result Messages (EMV Only). To decrypt it, the host must first determine what key to use, then decrypt the data. 5.1 Determining Key When the device and the host are using TDES DUKPT key management and the device is encrypting data (see Security Levels), the host software must do the following to generate a key (the derived key ) to use for decryption: 1) Determine the value of the Initial Key loaded into the device. The lookup methods the host software uses depend on the overall solution architecture, and are outside the scope of this document. However, most solutions do this in one of two ways, both of which use the Initial Key Serial Number that arrives with the encrypted data (see Command 0x09 - Get Current TDES DUKPT KSN for details about interpreting the KSN): a) Look up the value of the Base Derivation Key using the Initial KSN portion of the current KSN as an index value, then use TDES DUKPT algorithms to calculate the value of the Initial Key; or b) Look up the value of the Initial Key directly, using the Initial KSN portion of the current KSN as an index value. 2) Derive the current key. Apply TDES DUKPT algorithms to the Initial Key value and the encryption counter portion of the KSN that arrives with the encrypted data. 3) Determine what variant the device used to create the derived key it used to encrypt. The variants are defined in ANS X9.24 Part 1, which programmers of host software must be familiar with. Which variant the host should use to calculate the derived key depends on the type of data the host is decrypting or encrypting, and on device settings: a) Encrypted MagnePrint Data is encrypted according to the setting in Property 0x56 - MagnePrint Data Encryption Variant (MSR Only, Configurable MagnePrint Variants Only), if the device supports it. Otherwise, it is encrypted according to the setting in Property 0x54 - Card Data Encryption Variant (MSR Only, Configurable MSR Variants Only), if the device supports it. Otherwise, it is encrypted using the PIN Encryption variant. b) Encrypted Track Data and Encrypted Session ID is encrypted according to the setting in Property 0x54 - Card Data Encryption Variant (MSR Only, Configurable MSR Variants Only), if the device supports it. Otherwise, it is encrypted using the PIN Encryption variant. c) EMV data is encrypted according to the setting in Property 0x67 - EMV Data Encryption Variant (EMV Only). 4) Use the variant algorithm with the current key to calculate that variant. 5) Decrypt the data according to the steps in section 5.2 Decrypting Data. Page 23 of 209 (D )

24 5 - Encryption, Decryption, and Key Management 5.2 Decrypting Data For Encrypted Track Data and encrypted EMV data in ARQC Messages (EMV Only) and Transaction Result Messages (EMV Only), the device begins by encrypting the first 8 bytes of clear text track data. The 8-byte result of this encryption is placed in an encrypted data buffer. The process continues using the DES CBC (Cipher Block Chaining) method with the encrypted 8 bytes XORed with the next 8 bytes of clear text. That result is placed in next 8 bytes of the encrypted data buffer, and the device continues until all clear text bytes have been encrypted. If the final block of clear text contains fewer than 8 bytes, the device pads the end of the block to make 8 bytes. After the final clear text block is XORed with the prior 8 bytes of encrypted data, the device encrypts it and places it in the encrypted data value. No Initial Vector is used in the process. The host must decrypt the data in 8 byte blocks, ignoring any final unused bytes in the last block. When a value consists of more than one block, the host should use the CBC method to decrypt the data by following these steps: 1) Start decryption on the last block of 8 bytes (call it block N) using the key. 2) XOR the result of the decryption with the next-last block of 8 bytes (block N-1). 3) Repeat until reaching the first block. 4) Do not XOR the first block with anything. 5) Concatenate all blocks. 6) Determine the expected length of the decrypted data. In some cases this may be a standard field length, and in other cases the expected data length may accompany the encrypted data. When decrypting track data where no length is available, the host software can use the End Sentinel to find the actual end of the data (ignoring the padding at the end, which contains all zeroes). 7) Truncate the end of the decrypted data block to the expected data length, which discards the padding at the end. Page 24 of 209 (D )

25 6 - Magnetic Stripe Card Data Sent from Device to Host (MSR Only Keypad Entry Only) 6 Magnetic Stripe Card Data Sent from Device to Host (MSR Only Keypad Entry Only) The device sends card swipe data to the host even if it can not fully decode the data. How the host interprets incoming messages to find the data detailed in this section depends on the connection type (see section 2 Connection Types) and the data format (see section 3 Data Formats). Each subsection is tagged with the features, connection types, and data formats for which it is relevant. Table 6-1 provides a convenient summary / index of all available values and their offsets. Table List of Magnetic Stripe Data Sorted By GATT/SLIP Offset Data Track 1 Decode Status (HID, TLV, GATT, SLIP) 0x20 0 Track 2 Decode Status (HID, TLV, GATT, SLIP) 0x21 1 Track 3 Decode Status (HID, TLV, GATT, SLIP, 3-Track Only) Page 25 of 209 (D ) HID Usage GATT/SLIP Offset 0x22 2 Track 1 Encrypted Data Length (HID, GATT, SLIP) 0x28 3 Track 2 Encrypted Data Length (HID, GATT, SLIP) 0x29 4 Track 3 Encrypted Data Length (HID, GATT, SLIP, 3-Track Only) 0x2A 5 Card Encode Type (HID, TLV, GATT, SLIP) 0x38 6 Track 1 Encrypted Data 0x Track 2 Encrypted Data 0x Track 3 Encrypted Data 0x Reserved 0x MagnePrint Status 0x MagnePrint Data Length (HID, GATT, SLIP) 0x2B 348 Encrypted MagnePrint Data 0x Device Serial Number 0x Device Encryption Status 0x DUKPT Key Serial Number (KSN) 0x Track 1 Masked Data Length (HID, GATT, SLIP) 0x Track 2 Masked Data Length (HID, GATT, SLIP) 0x Track 3 Masked Data Length (HID, GATT, SLIP, 3-Track Only) 0x Track 1 Masked Data 0x4A Track 2 Masked Data 0x4B Track 3 Masked Data (3-Track Only) 0x4C Encrypted Session ID 0x Track 1 Absolute Data Length (HID, GATT, SLIP) 0x51 852

26 6 - Magnetic Stripe Card Data Sent from Device to Host (MSR Only Keypad Entry Only) Data HID Usage GATT/SLIP Offset Track 2 Absolute Data Length (HID, GATT, SLIP) 0x Track 3 Absolute Data Length (HID, GATT, SLIP, 3-Track Only) 0x MagnePrint Absolute Data Length (HID, TLV, GATT, SLIP) 0x Remaining MSR Transactions 0x MagneSafe Version Number (HID, GATT, SLIP) 0x Reserved 0x HID Report Version (HID, GATT, SLIP) 0x Reserved 0x MagnePrint KSN (HID, TLV, GATT, SLIP) 0x5A Battery Level (HID, GATT, SLIP) 0x5B About Track Data After the host receives and decrypts Encrypted Track Data from the device, or receives clear text track data (based on device settings or state), or receives Masked Track Data, it may need to parse each track into individual values embedded in the tracks. The device can read multiple card formats, which vary even between different issuers and payment brands using the same underlying standards. Describing all possible formats is beyond the scope of this document, but this section describes how to parse data from tracks 1, 2, and 3 in a generic ISO/ABA compliant format as an example. Table 6-2 shows an example of ISO/ABA track data the device sends to the host, using unmasked placeholder numbers to make it easier to see the relative positions of the values embedded in the track data. It is important to note that some cards do not include Track 3 data, and some devices do not read or transmit Track 3 data (see section 1.5 About Device Features). Table 6-2 Example Generic ISO/ABA Track Data Format Track 1 Data Generic ISO/ABA Track Data Format % ^CARDHOLDER NAME/^ ? Track 2 Data ; = ? Track 3 Data ; = ? The example track data in Table 6-2 can be interpreted as follows: The %,?, and ; are Sentinels / delimiters, and are taken directly from the data on the card. The 7 at the beginning of Track 1 data is the card format code. For swiped credit / debit cards, this comes from the card and is generally B. The string of 5s is the Account Number / License Number / PAN. The carets ^ are a standard ISO track 1 delimiter surrounding the Cardholder Name. CARDHOLDER NAME/ is the Cardholder Name. The string of 3s is the Expiration Date. Page 26 of 209 (D )

27 6 - Magnetic Stripe Card Data Sent from Device to Host (MSR Only Keypad Entry Only) The string of 8s is the Service Code. For swiped credit / debit cards, this comes from the card. The remaining characters (0s, 4s, and 6) are Discretionary Data. For swiped debit / credit cards this data is of varying length and content and comes from the card, and must be interpreted according to the standards established by issuers, payment brands, and so on. Page 27 of 209 (D )

28 6 - Magnetic Stripe Card Data Sent from Device to Host (MSR Only Keypad Entry Only) 6.2 Track 1 Decode Status (HID, TLV, GATT, SLIP) This one-byte value indicates the status of decoding Track 1. If bit 0 is OFF, no error occurred. If bit 0 is ON, the device found non-noise data that was not decodable, and the device reports the track data length is zero and does not provide valid track data to the host. HID Streaming Format Usage 0x20 N/A TLV Data Object 8262 Byte 1 GATT/SLIP Offset 0 Bit Position Where to Find Value Value Reserved Reserved Reserved Reserved Reserved Reserved Reserved Error 6.3 Track 2 Decode Status (HID, TLV, GATT, SLIP) This one-byte value indicates the status of decoding Track 2. If bit 0 is OFF, no error occurred. If bit 0 is ON, the device found non-noise data that was not decodable, and the device reports the track data length is zero and does not provide valid track data to the host. HID Streaming Format Usage 0x21 N/A TLV Data Object 8262 Byte 2 GATT/SLIP Offset 1 Where to Find Value Bit Position Value Reserved Reserved Reserved Reserved Reserved Reserved Reserved Error 6.4 Track 3 Decode Status (HID, TLV, GATT, SLIP, 3-Track Only) This one-byte value indicates the status of decoding Track 3. If bit 0 is OFF, no error occurred. If bit 0 is ON, the device found non-noise data that was not decodable, and the device reports the track data length is zero and does not provide valid track data to the host. HID Streaming Format Usage 0x22 N/A TLV Data Object 8262 Byte 3 GATT/SLIP Offset 2 Where to Find Value Page 28 of 209 (D )

29 6 - Magnetic Stripe Card Data Sent from Device to Host (MSR Only Keypad Entry Only) Bit Position Value Reserved Reserved Reserved Reserved Reserved Reserved Reserved Error 6.5 Card Encode Type (HID, TLV, GATT, SLIP) This one-byte value indicates the type of encoding the device found on a swiped magnetic stripe card. Table 6-3 defines the possible values. For details about how the device determines the card s encode type, see Appendix B Identifying ISO/ABA and AAMVA Cards For Masking (MSR Only). Format HID Usage 0x38 Streaming N/A TLV Data Object 8261 GATT/SLIP Offset 6 Where to Find Value Table Card Encode Types Value Encode Type 0 ISO/ABA 1 AAMVA 2 Reserved Reserved. Description ISO/ABA encode format. At least one track in ISO/ABA format, Track 3 not AAMVA format. See Appendix B Identifying ISO/ABA and AAMVA Cards for ISO/ABA description. AAMVA encode format. Track 3 is AAMVA format, Tracks 1 and 2 are ISO/ABA if correctly decoded. See Appendix B Identifying ISO/ABA and AAMVA Cards for AAMVA description. 3 Blank The card is blank. All tracks decoded without error and without data. 4 Other 5 Undetermined The card has a non-standard encode format. For example, ISO/ABA track 1 format on track 2. The card encode type could not be determined because no tracks could be decoded. Combination of Error tracks and Blank Tracks, at least one Error track. Page 29 of 209 (D )

30 6 - Magnetic Stripe Card Data Sent from Device to Host (MSR Only Keypad Entry Only) 6.6 Device Encryption Status This two-byte value contains the Device Encryption Status in big endian byte order. Byte 1 is the least significant byte; the LSB of byte 1 is status bit 0, and the LSB of byte 2 is status bit 15. If the Encryption Enabled bit or Initial DUKPT Key Injected bit are not set, the device sends card data it would usually encrypt as clear text, and does not include a valid DUKPT Key Serial Number. When the DUKPT Keys Exhausted bit is set, the device no longer reads cards, but continues to send Magnetic Stripe Card Data Sent from Device to Host (MSR Only Keypad Entry Only) to report status. The data it sends to the host in this case does not include valid MagnePrint Status, Encrypted MagnePrint Data, Masked Track Data, or Encrypted Track Data. Format HID Usage 0x42 TLV Data Object 8001 GATT/SLIP Offset Where to Find Value The Device Encryption Status is defined as follows: Bit Meaning 0 DUKPT keys exhausted (1 = Exhausted, 0 = Keys available) 1 Initial DUKPT key injected, always set to 1 2 Encryption Enabled, always set to 1 3 Authentication Required 4 Timed out waiting for cardholder to swipe card No MSR Transactions Remaining [see Command 0x1C - Get Remaining MSR Transactions Counter (MSR Only)] DUKPT Variant used to encrypt Encrypted Track Data. 0 = PIN Variant, 1 = Data Variant/Bidirectional (Configurable MSR Variants Only) DUKPT Key Variant used to encrypt Encrypted MagnePrint Data. 0 = PIN Variant, 1 = Data Variant/Bidirectional (Configurable MagnePrint Variants Only) 14 Unused (always set to 0) 15 Unused (always set to 0) 6.7 Encrypted Track Data If decodable track data exists for a given track, the device returns it in the corresponding Track x Encrypted Data value, described in the subsections below. When the device is transmitting data in HID, GATT, or SLIP format, the Encrypted Data values are always 112 bytes long, which is the maximum number of bytes that can be encoded on a card. However, the length of actual valid data in each value may be less than 112 bytes, and is stored in the corresponding Page 30 of 209 (D )

31 6 - Magnetic Stripe Card Data Sent from Device to Host (MSR Only Keypad Entry Only) Encrypted Data Length value. The host software should ignore data located beyond the data length reported by the device. The device decodes the data from each track and converts it to ASCII, then (if the device is in Security Level 3 or Security Level 4) encrypts it. The encrypted track data includes all data starting with the start sentinel and ending with the end sentinel. For information about how the device encrypts the data and how the host should decrypt it, see section 5 Encryption, Decryption, and Key Management Track 1 Encrypted Data Length (HID, GATT, SLIP) This one-byte value indicates the number of bytes in the Track 1 Encrypted Data value. The value is always a multiple of 8. If the value is 0, the device found no data on the track or encountered an error decoding the track. After data is decrypted, there may be fewer bytes of decoded track data than indicated by this value. The number of bytes of decoded track data is indicated by the Track 1 Absolute Data Length value. Format HID Usage 0x28 Streaming N/A TLV N/A GATT/SLIP Offset 3 Where to Find Value Track 2 Encrypted Data Length (HID, GATT, SLIP) This one-byte value indicates the number of bytes in the Track 2 Encrypted Data value. The value is always a multiple of 8. If the value is 0, the device found no data on the track or encountered an error decoding the track. After data is decrypted, there may be fewer bytes of decoded track data than indicated by this value. The number of bytes of decoded track data is indicated by the Track 2 Absolute Data Length (HID, GATT, SLIP) value. Format HID Usage 0x29 Streaming N/A TLV N/A GATT/SLIP Offset 4 Where to Find Value Track 3 Encrypted Data Length (HID, GATT, SLIP, 3-Track Only) This one-byte value indicates the number of bytes in the Track 3 Encrypted Data value. The value is always a multiple of 8. If the value is 0, the device found no data on the track or encountered an error decoding the track. Page 31 of 209 (D )

32 6 - Magnetic Stripe Card Data Sent from Device to Host (MSR Only Keypad Entry Only) After data is decrypted, there may be fewer bytes of decoded track data than indicated by this value. The number of bytes of decoded track data is indicated by the Track 3 Absolute Data Length value. Format HID Usage 0x2A Streaming N/A TLV N/A GATT/SLIP Offset 5 Where to Find Value Track 1 Absolute Data Length (HID, GATT, SLIP) This one-byte value indicates the number of usable bytes in the Track 1 Encrypted Data value after decryption. If the value is 0, the device found no data on the track or encountered an error decoding the track. Format HID Usage 0x51 Streaming N/A TLV N/A GATT/SLIP Offset 852 Where to Find Value Track 2 Absolute Data Length (HID, GATT, SLIP) This one-byte value indicates the number of usable bytes in the Track 2 Encrypted Data value after decryption. If the value is 0, the device found no data on the track or encountered an error decoding the track. Format HID Usage 0x52 Streaming N/A TLV N/A GATT/SLIP Offset 853 Where to Find Value Track 3 Absolute Data Length (HID, GATT, SLIP, 3-Track Only) This one-byte value indicates the number of usable bytes in the Track 3 Encrypted Data value after decryption. If the value is 0, the device found no data on the track or encountered an error decoding the track. HID Streaming Format Usage 0x53 N/A Where to Find Value Page 32 of 209 (D )

33 6 - Magnetic Stripe Card Data Sent from Device to Host (MSR Only Keypad Entry Only) Format Where to Find Value TLV N/A GATT/SLIP Offset Track 1 Encrypted Data Format Where to Find Value HID Usage 0x30 TLV Data Object 8215 GATT/SLIP Offset Track 2 Encrypted Data Format Where to Find Value HID Usage 0x31 TLV Data Object 8216 GATT/SLIP Offset Track 3 Encrypted Data On 2-track devices (see Table Device Features), this value is included in incoming data as a null value. Format Where to Find Value HID Usage 0x32 TLV Data Object 8217 GATT/SLIP Offset MagnePrint Status This four-byte value contains 32 bits of MagnePrint status information in little endian byte order. Byte 1 is the least significant byte and its LSB is status bit 0. Byte 4 is the most significant byte and its MSB is status bit 31. Table 6-4 provides an example showing the meaning of the MagnePrint Status bits for a specific value. If Property 0x15 - MagnePrint Flags is set to not transmit MagnePrint data, the device does not include this value. Bit 0 = MagnePrint capable flag Bits 1 to 15 = Product revision & mode Bit 16 = Reserved Bit 17 = Reserved for noise measurement Bit 18 = Swipe too slow Bit 19 = Swipe too fast Page 33 of 209 (D )

34 6 - Magnetic Stripe Card Data Sent from Device to Host (MSR Only Keypad Entry Only) Bit 20 = Reserved Bit 21 = Actual card swipe direction (0 = Forward, 1 = Reverse) Bits = Reserved Format Where to Find Value HID Usage 0x23 TLV Data Object 8263 GATT/SLIP Offset Thinking about the value in hexadecimal notation, each hexadecimal digit represents 4 bits. For example, Table 6-4 shows a MagnePrint Status where the characters are A Page 34 of 209 (D )

35 6 - Magnetic Stripe Card Data Sent from Device to Host (MSR Only Keypad Entry Only) Table MagnePrint Status Example Nybble Hex Value MP Status Bit Value Usage 7 1 Product Revision/Mode 1 A 6 0 Product Revision/Mode 5 1 Product Revision/Mode 4 0 Product Revision/Mode 3 0 Product Revision/Mode Product Revision/Mode 1 0 Product Revision/Mode 0 1 MagnePrint capable 15 0 Product Revision/Mode Product Revision/Mode 13 0 Product Revision/Mode 12 0 Product Revision/Mode 11 0 Product Revision/Mode Product Revision/Mode 9 0 Product Revision/Mode 8 1 Product Revision/Mode 23 0 Reserved Reserved 21 0 Direction 20 0 Reserved 19 0 Too Fast Too Slow 17 0 Reserved for noise measurement 16 0 Reserved 31 0 Reserved Reserved 29 0 Reserved 28 0 Reserved 27 0 Reserved Reserved 25 0 Reserved 24 0 Reserved Page 35 of 209 (D )

36 6 - Magnetic Stripe Card Data Sent from Device to Host (MSR Only Keypad Entry Only) 6.9 MagnePrint Data Length (HID, GATT, SLIP) This one-byte value indicates the number of bytes in the Encrypted MagnePrint Data value, which is always a multiple of 8 bytes in length. This value is zero if there is no MagnePrint data. After the Encrypted MagnePrint data is decrypted, there may be fewer bytes of MagnePrint data than indicated by this value. The number of bytes of decrypted MagnePrint data is indicated by MagnePrint Absolute Data Length. Format HID Usage 0x2B Streaming N/A TLV N/A GATT/SLIP Offset 348 Where to Find Value 6.10 MagnePrint Absolute Data Length (HID, TLV, GATT, SLIP) This one-byte value indicates the number of usable bytes in Encrypted MagnePrint Data value after decryption. Format HID Usage 0x54 Streaming N/A TLV Data Object 8263 GATT/SLIP Offset 855 Where to Find Value 6.11 Encrypted MagnePrint Data This value contains Encrypted MagnePrint data, which when decrypted generally yields a 54-byte value. The least significant bit of the first byte of data in the decrypted value corresponds to the first bit of MagnePrint data. If Property 0x15 - MagnePrint Flags is set to disable sending MagnePrint data, the device does not send this value. To derive a decrypted MagnePrint value to authenticate a card, the host should do the following: 1) If the device transmitted a MagnePrint Data Length, truncate the data to that length to strip out protocol padding and yield a decryptable data block. 2) Decrypt the data block. 3) If the device transmitted a MagnePrint Absolute Data Length (HID, TLV, GATT, SLIP), truncate the data to that length to yield the MagnePrint data. Format HID Usage 0x33 TLV Data Object 8218 GATT/SLIP Offset Where to Find Value Page 36 of 209 (D )

37 6 - Magnetic Stripe Card Data Sent from Device to Host (MSR Only Keypad Entry Only) 6.12 Device Serial Number This 16-byte ASCII value contains the device serial number in a null-terminated string, so the maximum length of the device serial number, not including the null terminator, is 15 bytes. This device serial number can also be retrieved and set with Property 0x03 - Device Serial Number. This value is stored in non-volatile memory, so it persists when the device is power cycled. Format HID Usage 0x40 TLV Data Object 8102 GATT/SLIP Offset Where to Find Value 6.13 Masked Track Data If decodable track data exists for a given track, the device returns a masked version of the data in the Track x Masked Track Data value for that track. The masked version includes one byte of data for each character decoded from the track, starting with the Start Sentinel and ending with the End Sentinel. Much of the data is masked; the device sends a specified mask character instead of the actual character read from the track. Which characters are masked depends on the Card Encode Type (HID, TLV, GATT, SLIP): Only ISO/ABA (Financial Cards with ISO/IEC 7813 Format code B) and AAMVA cards are selectively masked; all other card types are either sent entirely masked or entirely unmasked. More detail about masking is included in the sections below about each specific track. There are separate masking settings for ISO/ABA format cards and AAMVA format cards (See Property 0x07 - ISO Track Mask and Property 0x08 - AAMVA Track Mask for more information). Each of these settings allows the host software to specify masking details for the Primary Account Number and Driver s License / ID Number (DL/ID#), the masking character to be used, and whether a correction should be applied to make the Mod 10 (Luhn algorithm) digit at the end of the number be correct. Table 6-5 provides an example of data from tracks 1, 2, and 3 of a swiped ISO/ABA card after it has been decrypted or if the device has sent it in the clear. Table 6-6 shows the same data as it might appear with a specific set of Masked Track Data rules applied. Table 6-5 Sample ISO/ABA Swiped Track Data, Clear Text / Decrypted Sample ISO/ABA Swiped Track Data, Clear Text / Decrypted Track 1 %B ^ TEST CARD ^ ? Track 2 ; = ? Track 3 ; = ? Table 6-6 Sample ISO/ABA Swiped Track Data, Masked Sample ISO/ABA Swiped Track Data, Masked Track 1 %B ^ TEST CARD ^ ? Track 2 ; = ? Track 3 ; = ? Page 37 of 209 (D )

38 6 - Magnetic Stripe Card Data Sent from Device to Host (MSR Only Keypad Entry Only) Data Formats with fixed Data field lengths (such as USB HID format, GATT format, and SLIP format, which are fixed at 112 bytes) include a Masked Track Data Length value for each track, which the host should use to truncate and ignore undefined data past the end of the track data. Formats where the host can easily determine where masked track data begins and ends (such as formats with delimiters or with data length built in to the format itself) do not include explicit masked track data lengths Track 1 Masked Data Length (HID, GATT, SLIP) This one-byte value indicates how many bytes of decoded card data are in the Track 1 Masked Data value. This value is zero if there is no data on the track or if there was an error decoding the track. Format HID Usage 0x47 Streaming N/A TLV N/A GATT/SLIP Offset 505 Where to Find Value Track 2 Masked Data Length (HID, GATT, SLIP) This one-byte value indicates how many bytes of decoded card data are in the Track 2 Masked Data value. This value is zero if there was no data on the track or if there was an error decoding the track. Format HID Usage 0x48 Streaming N/A TLV N/A GATT/SLIP Offset 506 Where to Find Value Track 3 Masked Data Length (HID, GATT, SLIP, 3-Track Only) This one-byte value indicates how many bytes of decoded card data are in the Track 3 Masked Data value. This value is zero if there was no data on the track or if there was an error decoding the track. Format HID Usage 0x49 Streaming N/A TLV N/A GATT/SLIP Offset 507 Where to Find Value Track 1 Masked Data This value contains the masked track data for track 1. All characters are transmitted. For an ISO/ABA card, the PAN is masked as follows: Page 38 of 209 (D )

39 6 - Magnetic Stripe Card Data Sent from Device to Host (MSR Only Keypad Entry Only) The number of initial characters and trailing characters specified by Property 0x07 - ISO Track Mask is sent unmasked. If Mod 10 correction is specified (see section 9.6 Property 0x07 - ISO Track Mask), all but one of the intermediate characters of the PAN are set to zero; one of them are set such that the last digit of the PAN calculates an accurate Mod 10 check of the rest of the PAN as transmitted. If the Mod 10 correction is not specified, all of the intermediate characters of the PAN are set to the specified mask character. Cardholder Name and the Expiration Date are sent unmasked. kdynamo also sends the Service Code unmasked. All Field Separators are sent unmasked. All other characters are set to the specified mask character. For an AAMVA card, the specified mask character is substituted for all characters read from the card. Format Where to Find Value HID Usage 0x4A (112 bytes fixed, must be truncated) TLV Data Object 8221 GATT/SLIP Offset Track 2 Masked Data This 112-byte value contains the masked track data for track 2. For an ISO/ABA card, the PAN is masked as follows: The number of initial characters and trailing characters specified by Property 0x07 - ISO Track Mask is sent unmasked. If Mod 10 correction is specified (see Property 0x07 - ISO Track Mask), all but one of the intermediate characters of the PAN are set to zero; one of them are set such that last digit of the PAN calculates an accurate Mod 10 check of the rest of the PAN as transmitted. If the Mod 10 correction is not specified, all of the intermediate characters of the PAN are set to the specified mask character. The Expiration Date is transmitted unmasked. kdynamo also sends the Service Code unmasked. All Field Separators are sent unmasked. All other characters are set to the specified mask character. For an AAMVA card, the DL/ID# is masked as follows: The specified number of initial characters are sent unmasked. The specified number of trailing characters are sent unmasked. If Mod 10 correction is specified (see Property 0x08 - AAMVA Track Mask), all but one of the intermediate characters of the DL/ID#PAN are set to zero; one of them is set such that last digit of the DL/ID# calculates an accurate Mod 10 check of the rest of the DL/ID# as transmitted. If the Mod 10 correction is not specified, all of the intermediate characters of the DL/ID# are set to the specified mask character. The Expiration Date and Birth Date are transmitted unmasked. All other characters are set to the specified mask character. Page 39 of 209 (D )

40 6 - Magnetic Stripe Card Data Sent from Device to Host (MSR Only Keypad Entry Only) Format Where to Find Value HID Usage 0x4B (112 bytes fixed, must be truncated) TLV Data Object 8222 GATT/SLIP Offset Track 3 Masked Data (3-Track Only) This 112-byte value contains the Masked Track Data for track 3. On 2-track devices (see Table Device Features), this value is not included in the incoming data. For an ISO/ABA card, the PAN is masked as follows: The number of initial characters and trailing characters specified by Property 0x07 - ISO Track Mask is sent unmasked. If Mod 10 correction is specified (see section 9.6 Property 0x07 - ISO Track Mask), all but one of the intermediate characters of the PAN are set to zero; one of them is set such that last digit of the PAN calculates an accurate Mod 10 check of the rest of the PAN as transmitted. If the Mod 10 correction is not specified, all of the intermediate characters of the PAN are set to the specified mask character. All Field Separators are sent unmasked. All other characters are set to the specified mask character. For an AAMVA card, the specified mask character is substituted for all characters read from the card. Format Where to Find Value HID Usage 0x4C (112 bytes fixed, must be truncated) TLV Data Object 8223 GATT/SLIP Offset Encrypted Session ID This 8-byte value contains the encrypted version of the current Session ID. Its primary purpose is to prevent replays. After a card is read, this property is encrypted, along with the card data, and supplied as part of the transaction message. The clear text version is never transmitted. To avoid replay, the host software should set the Session ID property before a transaction, and verify that the Encrypted Session ID returned with card data decrypts to the original value it set. Format Where to Find Value HID Usage 0x50 TLV Data Object 8309 GATT/SLIP Offset DUKPT Key Serial Number (KSN) This 80-bit value contains the TDES DUKPT Key Serial Number (KSN) associated with encrypted values included in the same message. For details about how to interpret this value, see section Page 40 of 209 (D )

41 6 - Magnetic Stripe Card Data Sent from Device to Host (MSR Only Keypad Entry Only) Command 0x09 - Get Current TDES DUKPT KSN. If no keys are loaded, all bytes have the value 0x00. Format HID Usage 0x46 TLV Data Object 8301 GATT/SLIP Offset Where to Find Value 6.16 Remaining MSR Transactions This 3-byte value contains the number of MSR transactions remaining at the end of the current transaction. The value is also sometimes referred to as the transaction threshold. See Command 0x1C - Get Remaining MSR Transactions Counter (MSR Only) for more information. Format HID Usage 0x55 TLV Data Object 810A GATT/SLIP Offset Where to Find Value 6.17 MagneSafe Version Number (HID, GATT, SLIP) This eight-byte value contains the MagneSafe Version Number with at least one terminating 0x00 byte to make string manipulation convenient. See Property 0x04 - MagneSafe Version Number for more information. Format HID Usage 0x56 Streaming N/A TLV N/A GATT/SLIP Offset Where to Find Value 6.18 HID Report Version (HID, GATT, SLIP) This one-byte value contains the version number of the HID Report format. If the report does not contain this value, it can implicitly be assumed to be equal to 0x01. If the report does contain this value, it indicates the following: HID Report Version Empty 0x02 0x03 Original HID Report Changes Added HID Report Version (HID, GATT, SLIP) Added Reserved Added Battery Level (HID, GATT, SLIP) Page 41 of 209 (D )

42 6 - Magnetic Stripe Card Data Sent from Device to Host (MSR Only Keypad Entry Only) Format HID Usage 0x58 Streaming N/A TLV N/A GATT/SLIP Offset 887 Where to Find Value 6.19 MagnePrint KSN (HID, TLV, GATT, SLIP) This 80-bit value contains the TDES DUKPT Key Serial Number associated with encrypted MagnePrint values included in the same message. The rightmost 21 bits are the current value of the encryption counter. The leftmost 59 bits are a combination of the Key Set ID (KSID) that identifies the Base Derivation Key injected into the device during manufacture, and the device s serial number; how those two values are combined into the 59 bits is defined by a convention the customer decides when architecting the solution, with support from MagTek. If no keys are loaded, all bytes have the value 0x00. Format HID Usage 0x5A Streaming N/A TLV Data Object 8305 GATT/SLIP Offset Where to Find Value 6.20 Battery Level (HID, GATT, SLIP) This one-byte value contains the battery level of the device between 0% and 100%. 0x00 represents the lowest safe operating voltage; 0x64 means the battery is at full voltage. This field should be ignored for devices that do not contain a battery. Format HID Usage 0x5B Streaming N/A TLV N/A GATT/SLIP Offset 930 Where to Find Value Page 42 of 209 (D )

43 7 - Notification Messages Sent from Device to Host (Extended Notifications Only) 7 Notification Messages Sent from Device to Host (Extended Notifications Only) 7.1 About Notification Mesages This section provides detail about unsolicited generic notification messages the device sends to the host, excluding magnetic stripe card data documented separately in section 6 Magnetic Stripe Card Data Sent from Device to Host. Each subsection is tagged with the features, connection types, and data formats for which it is relevant. Notification messages may be split into multiple packets, each containing a portion of the complete notification message. This allows notification messages to exceed the maximum packet sizes of the connection type and data format. After the host receives a complete notification message, it will have a notification identifier, a complete data length, and a complete notification message data field. How the host interprets incoming packets to find the data detailed in this section depends on the connection type (see section 2 Connection Types) and the data format (see section 3 Data Formats). All packets arrive at the host in the format-dependent structure shown in Table 7-1. Each incoming packet can be interpreted using Table 7-2. The notification message can be interpreted by first assembling all packets pertaining to the notification message, then looking up the corresponding Notification Identifier in the sections that follow. Table How Notification Message Packets Arrive HID Streaming TLV GATT/SLIP Format Where to Find Value Report identifier 2, Usage identifier 0x20 N/A N/A Similar to card data. For SLIP, see section 3.1 How to Use SLIP Format (SLIP Only). Table Structure of Packets That Form a Notification Message Offset Field Name 0..1 Partial Data Length 2..3 Data Offset 4..5 Notification Identifier Description The length of the Data field contained in the current message. This field is in big endian format. If this value is not equal to the Complete Data Length, the device is sending the notification using multiple packets. The offset position in bytes within the entire assembled notification where the first byte of the current packet s Data field is located. This field is in big endian format. The first byte of the entire notification s Data is at offset zero. The type of notification being sent. This field is in big endian format. The value corresponds to the notification identifier numbers in the headings of the subsections of section 7 Notification Messages Sent from Device to Host (Extended Notifications Only). In many cases, two-byte notification identifiers are assigned such that the high byte indicates a group of related commands, and the low byte specifies a command within that group. Page 43 of 209 (D )

44 7 - Notification Messages Sent from Device to Host (Extended Notifications Only) Offset Field Name n Complete Data Length Data Description The total length of data for the entire notification message, summing all Partial Data Lengths for multiple packets. This field is in big endian format. If this value is not equal to the Partial Data Length of the current packet, the device is sending the data using multiple packets. May contain part or all of the notification data. The size of this field is contained in the Partial Data Length field. Page 44 of 209 (D )

45 7 - Notification Messages Sent from Device to Host (Extended Notifications Only) 7.2 Notification Group 0x03 - EMV L2 (EMV Only) Notification Group 0x03 is reserved for EMV L2 notifications that support Command Group 0x03 - EMV L2 (EMV Only, Extended Commands Only) and Command Group 0x03 (Cont.) - EMV L2 Configuration (EMV Only, Extended Commands Only). For more information about the general flow of EMV transactions, see section 8.3 Command Group 0x03 - EMV L2 (EMV Only, Extended Commands Only) Notification 0x Transaction Status / Progress Information The device sends the host this notification to report progress during an EMV transaction the host has initiated using Extended Command 0x Initiate EMV Transaction (EMV Only, Extended Commands Only). The granularity of notifications is designed to give specific information about transaction steps that involve interaction with either the cardholder or the host. More information about when the device sends this notification to the host can be found in the documentation for that command. Some devices also send this notification outside the context of an EMV transaction to more generally notify the host that a card has been removed. The behavior of this notification is partly driven by the settings in Property 0x6D - EMV Contact Notification Configuration (Contact Only). Notification Data Offset Field Name Value 0 Event Indicates the event that triggered this notification: 0x00 = No events since start of transaction 0x01 = Card Inserted (Contact Only) 0x02 = Payment method communication or data error 0x03 = Transaction Progress Change 0x04 = Waiting for User Response 0x05 = Timed Out 0x06 = Transaction Terminated 0x07 = Host Cancelled Transaction 0x08 = Card Removed (Contact Only) 1 Current Operation Time remaining (Contactless Only) 0x09 = Contactless Token Detected, Powering Up Card Indicates the remaining time available, in seconds, for the indicated operation to complete. The timeout is set by the host when calling the command. Page 45 of 209 (D )

46 7 - Notification Messages Sent from Device to Host (Extended Notifications Only) 2 Offset Field Name Value Current Transaction Progress Indicator 3..4 Final Status TBD This one-byte field indicates the current processing stage for the transaction: 0x00 = No transaction in progress 0x01 = Waiting for cardholder to present payment 0x02 = Powering up the card 0x03 = Selecting the application 0x04 = Waiting for user language selection (Contact Only) 0x05 = Waiting for user application selection (Contact Only) 0x06 = Initiating application (Contact Only) 0x07 = Reading application data (Contact Only) 0x08 = Offline data authentication (Contact Only) 0x09 = Process restrictions (Contact Only) 0x0A = Cardholder verification (Contact Only) 0x0B = Terminal risk management (Contact Only) 0x0C = Terminal action analysis (Contact Only) 0x0D = Generating first application cryptogram (Contact Only) 0x0E = Card action analysis (Contact Only) 0x0F = Online processing 0x10 = Waiting online processing response 0x11 = Contact Transaction Complete (Contact Only) 0x12 = Transaction Error 0x13 = Transaction Approved 0x14 = Transaction Declined 0x15 = Transaction Cancelled by MSR Swipe (MSR Only) 0x16 = EMV error - Conditions Not Satisfied (Contact Only) 0x17 = EMV error - Card Blocked (Contact Only) 0x18 = Application selection failed (Contact Only) 0x19 = EMV error - Card Not Accepted (Contact Only) 0x1A = Empty Candidate List 0x1B = Application Blocked (Contactless Only) 0x2A = Collision Detected 0x2B = Refer to Mobile - Mobile device is prompting for additional cardholder interaction 0x2C = Contactless Transaction Complete 0x2D = Request Switch to ICC/MSR - Kernel has determined it can not continue with contactless payment method. 0x2E = Wrong Card Type (MSD or EMV) 0x2F = No Application Interchange Profile (Tag 82) Received Page 46 of 209 (D )

47 7 - Notification Messages Sent from Device to Host (Extended Notifications Only) Notification 0x Display Message Request The device sends this notification to request that the host display a message for the cardholder. The host should display the message. Notification Data Offset Field Name Value 0 Message This is an array of bytes that should be displayed by the host on its display exactly as received. If the message is too long to fit on a single line it may be split to multiple lines if the host wishes. Messages are limited to 1024 bytes. If the message is zero length, this is a request for the host to clear the display. Page 47 of 209 (D )

48 7 - Notification Messages Sent from Device to Host (Extended Notifications Only) Notification 0x User Selection Request (Contact Only) This notification is used to inform the host that a user selection is needed before the device can continue processing the current transaction. The host should prompt the cardholder to select an item from the menu, then send Extended Command 0x User Selection Result to inform the device that the transaction can proceed with the selected result. 0 Offset Field Name Value Selection Type 1 Timeout This field specifies what kind of selection request this is: 0x00 = Application Selection 0x01 = Language Selection Specifies the maximum time, in seconds, allowed to complete the selection process. If this time is exceeded, the host should send Extended Command 0x User Selection Result with the Selection Status field set to 0x02 (User Selection Request aborted, timeout) after which the transaction is aborted and an appropriate Transaction Status is available. Value 0 (User Selection Request completed) is not allowed in this case. This field is variable length and is a collection of null-terminated strings (maximum 17 strings). The maximum length of each string is 20 characters, not including a Line Feed (0x0A) character that may be in the string. The last string may not have the Line Feed character. 2 Menu Items The first string is a title and should not be considered for selection. It is expected that the host displays the menu items to the cardholder, then, after the cardholder makes a selection, call Extended Command 0x User Selection Result to return the number of the item the cardholder selected, which should be between 1 and the number of menu selection items being displayed. The first item, 0, is the title only. Page 48 of 209 (D )

49 7 - Notification Messages Sent from Device to Host (Extended Notifications Only) Notification 0x ARQC Message The device uses this notification to send ARQC data for the host to process. After the host processes the ARQC data, it should send Extended Command 0x Online Processing Result / Acquirer Response to inform the device it can proceed with the transaction. Table Notification Data, ARQC Message 0 2 Offset Field Name Value Message Length ARQC Message Two byte binary, most significant byte first. This gives the total length of the ARQC message that follows, excluding padding and CBC-MAC. See Property 0x68 EMV Message Format and Appendix C.1 ARQC Messages (EMV Only). The host is expected to use this data to process a request. Page 49 of 209 (D )

50 7 - Notification Messages Sent from Device to Host (Extended Notifications Only) Notification 0x Transaction Result Message The device sends this notification to provide the host with final information from the transaction. It usually includes data and an indication of whether a signature is required. Table Notification Data, Transaction Result Message 0 Offset Field Name Value Signature Required 1 Data Length 3 Data This field indicates whether a cardholder signature is required to complete the transaction: 0x00 = No signature required 0x01 = Signature required If a signature is required, the host should acquire the signature from the cardholder as part of the transaction data. Two byte binary, most significant byte first. This gives the total length of the Data message that follows, excluding padding and CBC-MAC. See Property 0x68 EMV Message Format and Appendix C.3 Transaction Result Messages. It is expected that the host will save this data as a record of the transaction. Page 50 of 209 (D )

51 8 - Commands 8 Commands This section describes the commands available on the device. In some MSR-only solutions, the host software only needs to obtain card data from the device (see section 6 Magnetic Stripe Card Data Sent from Device to Host) and does not need to send commands. Each command s section heading indicates the Connection Types, Data Formats, and device features (see section 1.5 About Device Features) that are relevant to it. 8.1 About Result Codes There are two types of Result Code values the device can return in its response: Generic result codes (listed in Table 8-1), which have the same meaning for all commands, and command-specific result codes, which can have different meanings for different commands, and are listed with every command in this section. Generic result codes always have the most significant bit set to zero, and command-specific result codes always have the most significant bit set to one. Table Generic Result Codes Value (Hex) Result Code Description 0x00 Success The command completed successfully. 0x01 Failure The command failed. 0x02 Bad Parameter The command failed due to a bad parameter or command syntax error. 0x03 Redundant The command is redundant. 0x04 Bad Cryptography A bad cryptography operation occurred. 0x05 Delayed 0x06 No Keys No keys are loaded. The request is refused because the device is delaying requests as a defense against brute-force hacking. 0x07 Invalid Operation Depends on the context of the command. 0x08 Response not available The response is not available. 0x09 Not enough power The battery is too low to operate reliably. 0x0A 0x0B Extended response first packet (Extended Commands Only) Extended command pending (Extended Commands Only) The device is returning the first (and possibly only) packet of an Extended Response. An extended command is pending and the device is waiting for more data. 0x0D Not implemented The command is not implemented. Page 51 of 209 (D )

52 8 - Commands 8.2 General Commands Command 0x00 - Get Property This command gets a property from the device. For details about properties, see section 9 Properties. Most properties have a firmware default value that may be changed during manufacturing or the order fulfillment process to support different customer needs. Data Field for Request Data Offset 0 Property ID Value Data Field for Response 0..n Data Offset Property Value Value Property ID is a one-byte value that identifies the property. A full list of properties can be found in section 9 Properties. Property Value consists of the multiple-byte value of the property. The number of bytes in this value depends on the type of property and the length of the property. Table 8-2 describes the available property types. Table Property Types Byte Property Type String Description This is a one-byte value. The range of valid values depends on the property. This is a null-terminated ASCII string. Its length can be zero to a maximum length that depends on the property. The length of the string does not include the terminating NULL character. The result codes for the Get Property command can be any of the generic result codes listed in Table 8-1 on page 51. Page 52 of 209 (D )

53 8 - Commands Command 0x01 - Set Property (MAC) This command sets a property in the device. For security purposes, this command is privileged. When the Security Level is set to higher than 2 (see section 4 Security Levels), this command must be MACed to be accepted [see section 4.1 About Message Authentication Codes (MAC)]. The command is logically paired with Command 0x00 - Get Property. For details about properties, see section 9 Properties. Some properties require the device to be reset using Command 0x02 - Reset Device (MAC) or power cycled to take effect. In those cases, the documentation for the property indicates what is required. Data Field for Request Data Offset 0 Property ID 1..n Property Value Value Data Field for Response: None The result codes for the Set Property command can be any of the generic result codes listed in Table 8-1 on page 51. If the Set Property command gets a result code of 0x07, it means the required MAC was absent or incorrect. Property ID is a one-byte value that identifies the property. A full list of properties can be found in section 9 Properties. Property Value consists of multiple bytes containing the value of the property. The number of bytes in this value depends on the property. Table 8-3 describes the available property types. Table Property Types Byte Property Type String Description This is a one-byte value. The range of valid values depends on the property. This is a multiple-byte ASCII string. Its length can be zero to a maximum length that depends on the property. The data length listed in the tables for each property does not include the terminating NULL character. Page 53 of 209 (D )

54 8 - Commands Command 0x02 - Reset Device (MAC) This command is used to reset the device, and can be used to make property changes take effect without power cycling the device. If the device is in the midst of an Authentication Sequence initiated by Command 0x10 - Activate Authenticated Mode (MSR Only), the device does not honor the Reset Device command until after the Authentication Sequence has successfully completed, or a cardholder swipes a card, or the device is power cycled. If the Authentication Sequence fails, the device initiates anti-hack mode and will require that the host MAC the Reset Device command (see section 4 Security Levels). This prevents a dictionary attack on the keys and reduces the potential impact of denial of service attacks. In rare instances, devices may optionally be configured at the manufacturer to require a MAC for every Reset Device command call, not just when anti-hack behavior is active. Data Field for Request: None Data Field for Response: None Result codes: 0x00 = Success 0x07 = Incorrect MAC, or authentication sequence is pending Example Reset Device Request (Hex) Cmd Num Data Len Data Example Reset Device Response (Hex) Result Code Data Len Data Page 54 of 209 (D )

55 8 - Commands Command 0x09 - Get Current TDES DUKPT KSN The host uses this command to get the current Triple Data Encryption Standard (TDES) DUKPT Key Serial Number (KSN) on demand. This 80-bit value contains the TDES DUKPT Key Serial Number (KSN) associated with encrypted values included in the same message. The rightmost 21 bits are the current value of the encryption counter. The leftmost 59 bits are the device s Initial KSN, which is a combination of the Key Set ID that identifies the Base Derivation Key (BDK) injected into the device during manufacture, and the device s serial number (DSN); how those two values are combined into the 59 bit Initial KSN is defined by a convention the customer defines when architecting the solution, with support from MagTek. For example, one common scheme is to concatenate a 7 hex digit (28 bit) Key Set ID, a 7 hex digit (28 bit) Device Serial Number, and 3 padding zero bits. In these cases, the key can be referenced by an 8-digit MagTek part number ( key ID ) consisting of the 7 hex digit Key Set ID plus a trailing 0. Data Field for Request: None Data Field for Response Offset Field Name Description 0 Current Key Serial Number 80-bit TDES DUKPT KSN Result codes: 0x00 = Success 0x02 = Bad Parameter - The Data field in the request is not the correct length. The request command contains no data, so the Data Length must be 0. Example Get Current TDES DUKPT KSN Request (Hex) Cmd Num Data Len Data None Example Get CURRENT TDES DUKPT KSN Response (Hex) Result Code Data Len Data 00 0A FFFF E Page 55 of 209 (D )

56 8 - Commands Command 0x0A - Set Session ID (MSR Only) This command is used to set the current Session ID, which the device transmits to the host in the Encrypted Session ID. The new Session ID stays in effect until one of the following occurs: The host sends the device another Set Session ID command. The device is powered off. The device is put into Suspend mode. The Session ID is used by the host to uniquely identify the present transaction. Its primary purpose is to prevent replays. After the device reads a card, it encrypts the Session ID along with the card data, and supplies it as part of the Magnetic Stripe Card Data Sent from Device to Host. The device never transmits a clear text version of this data. Data Field for Request Offset Field Name Description 0 New Session ID This eight byte value may be any value the host software wishes. Data Field for Response: None Result codes: 0x00 = Success 0x02 = Bad Parameter - The Data field in the request is not the correct length. The Session ID is an 8- byte value, so the Data Length must be 8. Example Set Session ID Request (Hex) Cmd Num Data Len Data 0A Example Set Session ID Response (Hex) Result Code Data Len Data Page 56 of 209 (D )

57 8 - Commands Command 0x10 - Activate Authenticated Mode (MSR Only) This command is used by the host software to activate Authenticated Mode, and is the only way to enter that mode. When the device is set to Security Level 4 (see section 4.4 Security Level 4), it does not gather and transmit card data after a swipe until Authenticated Mode has been established with the host, indicating both devices have established a direct two-way trust relationship. The general sequence of events for entering Authenticated Mode is as follows: 1) The cardholder or operator performs an action as a lead-in to swiping a card, such as signing in to a web page that interacts with the device. 2) The host software is aware of the cardholder action, and in response it sends the Activate Authenticated Mode command to the device. As part of this command, the host software specifies a PreAuthentication Time Limit parameter in units of seconds. The device uses this time limit in subsequent steps. The device interprets any value less than 120 seconds to mean 120 seconds. 3) The device responds to the host with the current Key Serial Number (KSN) and two challenges (Challenge 1 and Challenge 2), which are encrypted using a variant of the current DUKPT PIN Encryption Key (Key XOR F0F0 F0F0 F0F0 F0F0 F0F0 F0F0 F0F0 F0F0). Challenge 1 contains 6 bytes of random numbers followed by the last two bytes of the KSN. Challenge 2 contains 8 bytes of random numbers. 4) The device waits up to the PreAuthentication Time Limit. If the device times out waiting for the host to respond, the Authentication attempt fails and the device may activate anti-hacking behavior. See below for details. 5) The host software decrypts Challenge 1 and Challenge 2 and compares the last two bytes of the KSN with the last two bytes of the clear text KSN to authenticate the device. 6) The host software completes the Activate Authentication sequence using Command 0x11 - Activation Challenge Response, including the length of time the device should keep Authenticated Mode active without a swipe. 7) The device determines whether the Activation Challenge Reply is valid. If it is valid, the device activates Authenticated Mode and allows transmission of swiped card data to the host. The device may optionally indicate to the operator that the host and the device are mutually authenticated. See below for information about device behavior when the Activation Challenge Reply is not valid. 8) Authenticated mode stays active until the timeout previously specified by the host in Command 0x11 - Activation Challenge Response, or until the device sends valid swipe data to the host, at which point the device deactivates Authenticated Mode. The first two Activate Authenticated Mode commands may proceed without any delay (one error is allowed with no anti-hacking consequences). If a second Activate Authenticated Mode in a row fails, the device activates anti-hacking behavior by enforcing an increasing delay between incoming Activate Authenticated Mode commands. The first delay is 10 seconds, increasing by 10 seconds up to a maximum delay of 10 minutes. The operator may deactivate anti-hacking mode at any time by swiping any encoded magnetic stripe card. When the device is in this anti-hacking mode, it requires the host to take additional steps to call Command 0x02 - Reset Device To support use of Authenticated Mode, the host software can use Command 0x14 - Get Device State (MSR Only) at any time to determine the current state of the device. Data Field for Request Offset Field Name Description 0 PreAuthentication Time Limit (msb) Most significant byte of the PreAuthentication Time Limit in seconds (120 seconds or greater) Page 57 of 209 (D )

58 8 - Commands Offset Field Name Description 1 PreAuthentication Time Limit (lsb) Least significant byte of the PreAuthentication Time Limit in seconds (120 seconds or greater) Data Field for Response Offset Field Name Description 0 Current Key Serial Number 10 Challenge 1 18 Challenge 2 This eighty-bit value includes the Initial Key Serial Number in the leftmost 59 bits and the value of the encryption counter in the rightmost 21 bits. The host should use this eight-byte challenge later in Command 0x11 - Activation Challenge Response, and to authenticate the device. The host should use this eight-byte challenge later in Command 0x12 - Deactivate Authenticated Mode. Result codes: 0x00 = Success 0x03 = Redundant - the device is already in this mode 0x05 = Delayed - the request is refused due to anti-hacking mode 0x07 = Sequence Error - the current Security Level is too low (see section 4 Security Levels) 0x80 = No MSR Transactions Remaining [see Command 0x1C - Get Remaining MSR Transactions Counter (MSR Only)] Example Activate Authenticated Mode Request (Hex) Cmd Num Data Len Data Example Activate Authenticated Mode Response (Hex) Result Code Data Len Data 00 1A FFFF A48B 7ED3 C FD4 03FA 8543 Page 58 of 209 (D )

59 8 - Commands Command 0x11 - Activation Challenge Response (MSR Only) This command is used as the second part of an Activate Authentication sequence following Command 0x10 - Activate Authenticated Mode. In this command, the host software sends the first 6 bytes of Challenge 1 (received in response to Command 0x10 - Activate Authenticated Mode) plus two bytes of timeout information, and (optionally) an eight byte Session ID encrypted with a variant of the current DUKPT PIN Encryption Key (Key XOR 3C3C 3C3C 3C3C 3C3C 3C3C 3C3C 3C3C 3C3C). The time information contains the maximum number of seconds the device should remain in Authenticated Mode. Regardless of the value of this timer, a card swipe in the Authenticated Mode ends the Authenticated Mode. The maximum time allowed is 3600 seconds (one hour). For example, for a full hour, use 0x0E10; for 3 minutes, use 0x012C. A value of 0x00 forces the device to stay in Authenticated Mode until a card swipe or power down occurs (no timeout). If the host includes Session ID information and the command is successful, it changes the Session ID in the device in the same way as calling Command 0x0A - Set Session ID. If the device decrypts the Challenge Response correctly, Activate Authenticated Mode has succeeded. If the device can not decrypt the Challenge Response correctly, Activate Authenticated Mode fails and the TDES DUKPT KSN advances. Data Field for Request Offset Field Name Description 0 Response to Challenge 1 8 Session ID Data Field for Response: None First 6 bytes of Challenge 1 plus a two-byte timeout (MSB first), encrypted by the specified variant of the current DUKPT Key. Optional eight byte Session ID encrypted by the specified variant of the current DUKPT Key. Result codes: 0x00 = Success 0x02 = Bad Parameters - the Data field in the request is not a correct length 0x04 = Bad Data - the encrypted reply data could not be verified 0x07 = Sequence - not expecting this command Example Activation Challenge Reply Request (Hex) Cmd Num Data Len Data Example Activation Challenge Reply Response (Hex) Result Code Data Len Data Page 59 of 209 (D )

60 8 - Commands Command 0x12 - Deactivate Authenticated Mode (MSR Only) This command is used to exit Authenticated Mode initiated by Command 0x10 - Activate Authenticated Mode. It can be used to exit the mode with or without incrementing the DUKPT transaction counter (lower 21 bits of the KSN). The host software must send the first 7 bytes of Challenge 2 (from the response to Command 0x10 - Activate Authenticated Mode) and the Increment flag (0x00 indicates no increment, 0x01 indicates increment the KSN) encrypted with a variant of the current DUKPT PIN Encryption Key (Key XOR 3C3C 3C3C 3C3C 3C3C 3C3C 3C3C 3C3C 3C3C). If the device decrypts Challenge 2 successfully, it exits Authenticated Mode, and depending on the Increment flag, may increment the KSN. If the device cannot decrypt Challenge 2 successfully, it stays in Authenticated Mode until either the time specified in Command 0x10 - Activate Authenticated Mode elapses or the cardholder or operator swipes a card. This behavior is intended to discourage denial of service attacks. Exiting Authenticated Mode by timeout or card swipe always increments the KSN; exiting Authenticated Mode using Command 0x12 - Deactivate Authenticated Mode may increment the KSN. Data Field for Request Offset Field Name Description 0 Response to Challenge 2 Data Field for Response: None Seven bytes of Challenge 2 plus one byte of Increment flag, encrypted by the specified variant of the current DUKPT Key Result codes: 0x00 = Success 0x02 = Bad Parameters - the Data field in the request is not the correct length 0x03 = Bad Data - the encrypted reply data could not be verified 0x07 = Sequence - not expecting this command Example Deactivate Authenticated Mode Request (Hex) Cmd Num Data Len Data Example Deactivate Authenticated Mode Response (Hex) Result Code Data Len Data Page 60 of 209 (D )

61 8 - Commands Command 0x14 - Get Device State (MSR Only) When the device is set to Security Level 4 (MSR Only), it requires mutual authentication with the host [see Command 0x10 - Activate Authenticated Mode (MSR Only)]. The host can use this command to determine the state of Authenticated Mode at a given point in time. For convenience, this manual refers to states with the notation State:Antecedent (e.g., WaitActAuth:BadSwipe), showing the current state and the state that led to it. Lists of possible states and their definitions are provided in the device response tables below. In most cases, the host software can also track the state of Authenticated Mode by inference. As the host software interacts with the device, most state transitions are marked by the messages exchanged with the device. The exception is the transition from WaitActRply:x to WaitActAuth:TOAuth, which happens if the device times out waiting for the host to send Command 0x11 - Activation Challenge Response (MSR Only), which the device does not report to the host. To cover this case, the host must be aware that a timeout could occur, in which case the device responds to Command 0x11 - Activation Challenge Response (MSR Only) with Result Code 0x07 (Sequence Error). Example 1 Power Up followed by Authentication and good swipe: 1) Device powers on. Host software should send this command to discover the current state of the device is WaitActAuth:PU. 2) Host sends a valid Command 0x10 - Activate Authenticated Mode (MSR Only). Device responds with result code 0x00, inferring the transition to the WaitActRply:PU state. 3) Host sends a valid Command 0x11 - Activation Challenge Response (MSR Only). Device responds with result code 0x00, inferring the transition to the WaitSwipe:PU state. 4) Cardholder swipes a card correctly. Device sends card data to the host, inferring the transition to the WaitActAuth:GoodSwipe state. Example 2 Device times out waiting for swipe: 1) Device waiting after a good swipe. Host software may send this command to discover the current state of the device is WaitActAuth:GoodSwipe. 2) Host sends valid Command 0x10 - Activate Authenticated Mode (MSR Only). Device responds with result code 0x00, inferring the transition to the WaitActRply:GoodSwipe state. 3) Host sends a valid Command 0x11 - Activation Challenge Response (MSR Only). Device responds with result code 0x00, inferring the transition to the WaitSwipe:GoodSwipe state. 4) Authenticated mode times out before a swipe occurs. Device sends mostly empty card data to the host to report the timeout in Device Encryption Status. The host infers the transition to the WaitActAuth:TOSwipe state. Example 3 Host sends invalid Command 0x11 - Activation Challenge Response (MSR Only): 1) Device waiting after a good swipe. Host software may send this command to discover the current state of the device is WaitActAuth:GoodSwipe. 2) Host sends valid Command 0x10 - Activate Authenticated Mode (MSR Only). Device responds with result code 0x00, inferring the transition to the WaitActRply:GoodSwipe state. 3) Host sends invalid Command 0x11 - Activation Challenge Response (MSR Only). Device responds with result code 0x02 or 0x04, inferring the transition to the WaitActAuth:FailAuth state. Example 4 Host waits too long sending Command 0x11 - Activation Challenge Response (MSR Only): 1) Device waiting after a good swipe. Host software may send this command to discover the current state of the device is WaitActAuth:GoodSwipe. Page 61 of 209 (D )

62 8 - Commands 2) Host sends valid Command 0x10 - Activate Authenticated Mode (MSR Only). Device responds with result code 0x00, inferring the transition to the WaitActRply:GoodSwipe state. 3) Device times out waiting for host to send Command 0x11 - Activation Challenge Response (MSR Only) (State => WaitActAuth:TOAuth). Host doesn t know because the device does not send any message. 4) Host eventually sends Command 0x11 - Activation Challenge Response (MSR Only) (State remains WaitActAuth:TOAuth). Device responds with result code 0x07, inferring the previous transition to WaitActAuth:TOAuth state. Data Field for Request: None Data Field for Response First Byte Current State Value Name Meaning 0x00 0x01 0x02 0x03 WaitActAuth WaitActRply WaitSwipe WaitDelay Current Device State Waiting for Activate Authenticated Mode. The device requires the host to authenticate using Command 0x10 - Activate Authenticated Mode before it accepts swipes. Waiting for Activation Challenge Reply. The host has started to authenticate, and the device is waiting for Command 0x11 - Activation Challenge Response. Waiting for swipe. The device is waiting for the cardholder or operator to swipe a card. Waiting for Anti-Hacking Timer. Two or more previous attempts to Authenticate have failed; the device is waiting for the Anti-Hacking timer to expire before it accepts Command 0x10 - Activate Authenticated Mode. Data Field for Response Second Byte - How the device got to its current state Value Name Meaning 0x00 0x01 PU GoodAuth Current State Antecedent Just Powered Up. The device has had no swipes and has not been Authenticated since it was powered up. Authentication Activation Successful. The host has sent the device a valid Command 0x11 - Activation Challenge Response. 0x02 GoodSwipe Good Swipe. The cardholder swiped a valid card correctly. 0x03 BadSwipe Bad Swipe. The cardholder swiped a card incorrectly or the card is not valid. 0x04 0x05 0x06 FailAuth FailDeact TOAuth Authentication Activation Failed. The most recent Command 0x11 - Activation Challenge Response failed. Authentication Deactivation Failed. A recent Command 0x12 - Deactivate Authenticated Mode failed. Authentication Activation Timed Out. The host failed to send Command 0x11 - Activation Challenge Response in the time period specified by Command 0x10 - Activate Authenticated Mode. Page 62 of 209 (D )

63 8 - Commands 0x07 TOSwipe Current State Antecedent Swipe Timed Out. The cardholder failed to swipe a card in the time period specified in Command 0x11 - Activation Challenge Response. Result codes: 0x00 = Success Example Get Device State Request (Hex) Cmd Num Data Len Data Example Get Device State Response (Hex) Result Code Data Len Data Page 63 of 209 (D )

64 8 - Commands Command 0x15 - Get / Set Security Level (MAC) This command is used to set the Security Level (see section 4 Security Levels). The host can use this to raise the Security Level but can not lower it. There are two versions of this command: The first is used to retrieve the current Security Level and does not require MACing; the second is used to set the Security Level and requires security/macing. Data Field for Request Offset Field Name 0 Security Level 1 MAC Description Optional: if present must be either 0x03 or 0x04. If absent, this is a query for the current Security Level. Four byte MAC to secure the command [see section 4.1 About Message Authentication Codes (MAC)]. If the host does not include a value for Security Level, it should not include the MAC value. Data Field for Response Offset Field Name 0 Security Level Description Only present if there was no Data in the request. This value gives the current Security Level. Result codes: 0x00 = Success 0x02 = Bad Parameters. The Data field in the request is not a correct length OR the specified Security Level is invalid; OR the current Security Level is 4. 0x07 = Incorrect MAC; command not authorized Example Set Security Level to 3 Request (Hex) Cmd Num Data Len Data xx xx xx xx, where xx xx xx xx is a valid MAC Example Set Security Level Response (Hex) Result Code Data Len Data Example Get Security Level Request (Hex) Cmd Num Data Len Data Example Get Security Level Response (Hex) Result Code Data Len Data Command 0x1C - Get Remaining MSR Transactions Counter (MSR Only) This command is used to get the maximum number of remaining card swipe transactions or correctly completed Authentication sequences (Command 0x10 - Activate Authenticated Mode followed by a Page 64 of 209 (D )

65 8 - Commands correct Command 0x11 - Activation Challenge Response) that the device can process. The value it returns is also sometimes referred to as the transaction threshold. The value has three possible states: Disabled - value 0xFFFFFF - In this state there is no limit to the number of transactions that can be performed. Expired - value 0x This state indicates MSR transactions and Authentication commands are prohibited. Active - value 1 to 1,000,000 (0x to 0x0F4240) - In this state, each transaction or successful Authentication sequence causes the value to be decremented and allows transactions to be processed. If an Authentication sequence decrements this value to 0, the device permits one final encrypted card swipe. Some devices are configured to only allow the manufacturer to call this command. Data Field for Request: None Data Field for Response Offset Field Name Description 0 16 Device Serial Number Remaining MSR Transactions 16 bytes of device serial number. If the serial number is shorter than 15 bytes, this value is left-justified and padded with binary zeroes. At least one byte (usually the last one) must contain binary zero. This three byte value contains the current number of remaining MSR transactions. Result codes: 0x00 = Success 0x02 = Invalid length Example Get Remaining MSR Transactions Request (Hex) Cmd Num Data Len Data 1C 00 Example Get Remaining MSR Transactions Response (Hex) MSR Transactions Remaining Result Code Data Len Data F1 Page 65 of 209 (D )

66 8 - Commands Command 0x45 - Get Battery Percentage (PM3, PM4, PM5, PM6) This command is used to get the percentage of useful battery charge remaining, in a range between 0x00 (0%) and 0x64 (100%). Data Field for Request: None Data Field for Response Offset Field Name Description 0 Battery Percentage Result codes: 0x00 = Success Example Get Battery Status Request (Hex) Cmd Num Data Len Data Example Get Battery Status Response (Hex) (Battery at 98%, almost full charge) Result Code Data Len Data Page 66 of 209 (D )

67 8 - Commands Command 0x49 - Send Extended Command Packet (Extended Commands) The host uses this command to send extended commands to the device as one or more data packets. This extended commands protocol doubles the command number namespace to two bytes, doubles the result code namespace to two bytes, and supports commands and responses which require larger data payloads than those available for standard commands. If the required command data is 52 bytes or shorter, the host can send the entire command using a single extended command packet. If the command data is longer than 52 bytes, the host should split the data into multiple packets of 52 or fewer bytes, and send multiple extended command packets. Assuming 52- byte packets, the first packet the host sends should specify Extended Data Offset = 0, the next packet should specify Extended Data Offset = 52, and so on, until the host has sent all the command data. The device s response to each packet contains either an extended command result code or a standard result code for the command that was sent: Result Code 0x0B - Extended Protocol Request Pending indicates the device is buffering the incoming data and expects the host to send subsequent packets. Result Code 0x0A - Extended Command Response indicates the device has received the complete data set and has executed the command. If the device has 52 bytes or fewer to return to the host, that concludes the round trip of the command. If the response data is greater than 52 bytes, the host must retrieve additional data by continuing to call Command 0x4A - Get Extended Response until it has retrieved all response data. Standard Result Code. When using this command to invoke a standard command (as opposed to an extended command), see the Result Codes in the documentation for the command the host is invoking. To simplify the development of custom host software, developers who are working exclusively with devices that support extended commands may choose to send all commands, including the single-byte commands described in this manual, using the extended commands protocol. Data Field for Request Offset Field Name Description n Extended Data Offset Extended Command Number Complete Extended Data Length Extended Data This field is in big endian format. It indicates the byte offset position of this packet s Extended Data field, relative to the complete extended data field being sent as multiple packets. The first byte is offset zero. This field is in big endian format and contains the number of the command to execute. For one-byte command numbers, the high byte should be set to zero. This field is in big endian format and gives the total length of the Extended Data field the host is sending as multiple packets. This field contains either part or all of the extended data request the host is sending to the device. The size of this Extended Data field can be determined by subtracting the Extended Data field s offset within the request (6) from the request s total data length (N). In most cases the request s complete data payload can have a maximum value of 58, so this field can have a maximum length of 58-6 = 52 bytes. Page 67 of 209 (D )

68 8 - Commands Data Field for an Extended Response Offset Field Name Description n Extended Data Offset Extended Result Code Complete Extended Data Length Extended Data Result Codes: See command description. This field is in big endian format. It indicates the byte offset position of this packet s Extended Data field, relative to the complete extended data field being sent as multiple packets. The first byte is offset zero. This field is in big endian format. For one-byte result codes, the high byte is set to zero. This field is in big endian format and gives the total length of the extended data field the host is sending as multiple packets. This field contains either part or all of the complete Extended Data response the device is sending to the host. The size of this Extended Data field can be determined by subtracting the Extended Data field s offset within the response (6) from the response s total data length (N). In most cases the response s complete data payload can have a maximum length of 58, so this field can have a maximum length of 58-6 = 52 bytes. Example Send Extended Command Packet Request for command 0x030D (Read Date and Time) Cmd Num Data Len Data D Example Send Extended Command Packet Response 0A Result Code Data Len Data 0D (6/20/2009 5pm) Page 68 of 209 (D )

69 8 - Commands Command 0x4A - Get Extended Response (Extended Commands) The host uses this command to retrieve additional response data longer than the current connection type s maximum packet size. After calling a command, if the device returns generic result code 0x0A Extended response first packet (see Table Generic Result Codes on page 51), the host software should begin buffering the complete Extended Response starting with the initial response, then call this command repeatedly until it has retrieved the complete Extended Response. The response data from the device follows the same Extended Data Offset rule as Command 0x49 - Send Extended Command Packet from the host: The first packet the device sends to the host specifies Extended Data Offset = 0, and subsequent packets, if any, specify Extended Data Offset = 52 (or other packet length depending on connection type), then 104, 156, and so on, until the device has sent all the response data. The host should continue sending this command to the device and buffering the returned Extended Data until the Extended Data Offset plus the length of the Extended Data is equal to the Complete Extended Data Length. Data Field for Request: None Data Field for Response Offset Field Name Description n Extended Data Offset Extended Result Code Complete Extended Data Length Extended Data This field is in big endian format. It indicates the byte offset position of this packet s Extended Data field, relative to the complete extended data field being sent as multiple packets. The first byte is offset zero. This field is in big endian format. For one byte result codes, the high byte is set to zero. This field is in big endian format and gives the total length of the extended data field the device is returning to the host in multiple packets. If the complete extended data fits in a single packet, this field is equal to the Data Length field minus 6. This field contains either part or all of the extended data the device is sending to the host. The size of this Extended Data field can be determined by subtracting the Extended Data field s offset within the response (6) from the response s total data length (N). In most cases the response s complete data payload can have a maximum value of 58, so this field can have a maximum length of 58-6 = 52 bytes. Result Codes: Same as defined in the Command 0x49 - Send Extended Command Packet. Example Get Extended Response Request to get the last 3 bytes of extended data out of 55 bytes Cmd Num Data Len Data 4A 00 Example Get Extended Response Result Code Data Len Data 0A Page 69 of 209 (D )

70 8 - Commands Command 0x58 - Set Head Subsystem Power State (PM5) The host uses this command to directly control power to the magnetic stripe reader head inside the device, to manage device power consumption and battery life. The tradeoff to using direct control is that the host must power up the head before a cardholder swipes a magnetic stripe card outside the scope of an EMV transaction. In the case of EMV transactions, the device controls head power automatically. After the device is power cycled or reset, it sets the head power state to the default value set in Property 0x70 - Head Subsystem Power State Default, at which point the host can directly manage the head power state by calling this command. If the host includes data in the command request message, the device sets the state as the command specifies, and does not include data in the response. If the host does not include data in the request message, the device returns the current state in the response. When the state is set to Always On, the head will always be powered. When the state is set to Off When Idle, the head will be off when the device is idle. In this state, the device will not be able to read magnetic stripe cards outside the scope of EMV transactions without first turning the head on. After reading a card, the host may opt to turn the head back off to conserve power. If the device needs to use the head for any operation other than reading a magnetic stripe card outside an EMV transaction, it will automatically turn the head on while using it, then off again. For example: If the host sends Extended Command 0x Initiate EMV Transaction (EMV Only, Extended Commands Only) and the transaction requires an MSR swipe, the device will automatically power up the head, then power it down when the EMV transaction terminates. When the host sends Command 0x09 - Get Current TDES DUKPT KSN, the device will automatically power up the head, then power it down after retrieving the required data. The same behavior applies to all commands and operations where the device needs to use the head. Data Field for Request Offset Field Name Description 0 State One byte specifying what the state should be: 0x00 = Off When Idle 0x01 = Always On Data Field for Response Offset Field Name Description 0 State See request data field description. Result codes: 0x00 = Success Example Head Subsystem Power State Request (Hex) Cmd Num Data Len Data Example Head Subsystem Power State Response (Hex) Result Code Data Len Data Page 70 of 209 (D )

71 8 - Commands Command 0xA0 - Enable / Disable MSR Output (MSR Disable Only) The host uses this command enable or disable the output of Magnetic Stripe Card Data Sent from Device to Host (MSR Only Keypad Entry Only) during extended operations where a card swipe would interrupt communication in process, such as EMV transactions or bulk encryption. Setting S to 0 causes the read ASIC to switch to a disabled / low power state. In this state, the ASIC does not read cards. The host must set the S bit to 1 to re-enable the device s magnetic stripe reader. Data Field for Request 0 Offset Field Name Description MSR Output Control Data Field for Response: None Bit 0 MSR Output Control 0 = MSR Output Disabled 1 = MSR Output Enabled Set all unused bits to 0. Result codes: 0x00 = Success 0x02 = Bad Parameters. Request data is not the correct length. Example Enable / Disable MSR Output Request (Hex) Cmd Num Data Len Data A Example Enable / Disable MSR Output Response (Hex) Result Code Data Len Data Page 71 of 209 (D )

72 8 - Commands 8.3 Command Group 0x03 - EMV L2 (EMV Only, Extended Commands Only) When calling Command 0x49 - Send Extended Command Packet (Extended Commands), a value of 0x03 in the most significant byte of the Extended Command Number is reserved for EMV L2 commands, which are documented in this section About EMV L2 Transaction Flows (EMV Only) The general flow of an EMV L2 transaction is as follows (bear in mind the device does not have a display, so in these steps the host drives the user interface for both the terminal operator / cashier and for the cardholder / customer): 1) The terminal operator / cashier performs steps external to the transaction, generally resulting in a total balance owed, and directs the host software to initiate a transaction. 2) The host software optionally sends the device Command 0xA0 - Enable / Disable MSR Output (MSR Disable Only) to disable MSR data transmission so cardholder swipes will not interrupt the operation of this command. 3) The host software sends the device Extended Command 0x Initiate EMV Transaction (EMV Only, Extended Commands Only). From this point until the host sends the device transaction results to the transaction processor, the host may cancel the EMV transaction by sending Extended Command 0x Cancel Transaction (EMV Only, Extended Commands Only). 4) If the cardholder has not already presented payment, the device sends the host Notification 0x Transaction Status / Progress Information, followed by Notification 0x Display Message Request to prompt the cardholder to PRESENT CARD. The device waits until the user presents payment, pending a timeout. (Contactless Only) If the cardholder presents more than one chip card or contactless payment device at the same time, the device sends Notification 0x Display Message Request to prompt the cardholder to PLEASE PRESENT ONE CARD ONLY. 5) (Contactless Only) If the device and the contactless payment device mutually support Mobile CVM and the contactless payment device s conditions for requiring Mobile CVM occur, the device sends the host Notification 0x Display Message Request with the message SEE PHONE FOR INSTRUCTIONS. Upon withdrawing the contactless payment device from the NFC field, the device sends the host Notification 0x Display Message Request with the message PRESENT CARD AGAIN. Simultaneously, the contactless payment device will prompt the user to enter a PIN; the cardholder should enter a PIN then re-tap. 6) (MSR Only) At this point, if the MSR is enabled and Extended Command 0x Initiate EMV Transaction (EMV Only, Extended Commands Only) indicated the MSR should be armed, the cardholder may swipe a magnetic stripe card: a) (EMV MSR Flow Only) If the device finds the Service Code on the card begins with 2 or 6, indicating the card is a chip card, the device clears all swipe data from memory and sends Notification 0x Display Message Request to the host with the message USE CHIP READER. The host should display the message to the operator or cardholder. The device waits for the cardholder to insert the card. Otherwise, if the Service Code indicates the card is an MSRonly card, the device treats the transaction as Online Only and jumps to the sending of Notification 0x ARQC Message below, and continues to the end of the transaction. b) On devices that do not support EMV MSR Flow (see Table 1-2), the device cancels the EMV transaction the host initiated, and reverts to the behavior described in section 6 Magnetic Stripe Card Data Sent from Device to Host (MSR Only Keypad Entry Only). 7) (Contact Only) If the cardholder has inserted a chip card, the device attempts to communicate with the card. If it is unable to do so: Page 72 of 209 (D )

73 8 - Commands a) (Contact Only) On devices that do not support EMV MSR Flow (see Table 1-2), the device immediately terminates the transaction with no retries and sends the host Notification 0x Transaction Status / Progress Information to report the failure. b) (Contact Only. EMV MSR Flow Only) On devices that do support EMV MSR Flow, the device sends Notification 0x Display Message Request to the host with the message INSERT AGAIN. If subsequent insertions succeed, the device continues, otherwise it will repeat this process for a total of three insertions. Upon the third failure: i) If Terminal setting DFDF67 is set to Fallback Disabled, the device terminates the transaction and sends the host Notification 0x Transaction Status / Progress Information to report the failure. ii) If Terminal setting DFDF67 is set to Fallback Enabled: (1) The device sends the host Notification 0x Display Message Request with the message CHIP ERROR: SWIPE CARD. The host should display the message. (2) Upon receiving a swipe, the device sends the host Notification 0x Transaction Status / Progress Information, followed by Notification 0x Display Message Request to report the results of the transaction to the host and the user. (3) The device ends the transaction by sending the host Notification 0x Transaction Result Message, which contains transaction details the host should save for later verification. Inside the message, the host should examine tag DFDF53 to determine the cause of the fallback to an MSR swipe (0x01 = Technical Fallback, 0x81 = MSR Fallback). 8) (Contact Only) If the cardholder has inserted a chip card, and the card reports to the device that the cardholder should select a language, the device sends the host Notification 0x User Selection Request to present a selection menu to the cardholder. After the cardholder selects a language, the host passes the selection to the device by sending Extended Command 0x User Selection Result (Contact Only, Extended Commands Only). 9) (Contact Only) If the cardholder has inserted a chip card, and the card holds more than one payment application, the device sends the host Notification 0x User Selection Request to prompt the cardholder to select which application to use. After the cardholder selects an application, the host passes the selection to the device by sending Extended Command 0x User Selection Result (Contact Only, Extended Commands Only). 10) The device communicates with the chip card or contactless payment device, and keeps the host and cardholder apprised of progress by sending one or more Notification 0x Transaction Status / Progress Information and Notification 0x Display Message Request. 11) If the device s terminal settings enable support for offline transactions, it consults the chip card or contactless payment device to determine whether to approve or decline the transaction offline, or perform the transaction online with the approve/decline decision made by the transaction processor. a) If an error occurs during this step, the device sends the host Notification 0x Transaction Status / Progress Information, followed by Notification 0x Transaction Result Message and terminates the transaction. b) If the transaction can proceed offline, the chip card or contactless payment device determines that the transaction outcome, the device will then send the host Notification 0x Display Message Request with message APPROVED or DECLINED to notify the cardholder of the transaction result. c) If the chip card or contactless payment device indicates the transaction must be performed online, the device passes this information to the host for forwarding to the transaction processor using Notification 0x ARQC Message. The next event depends on whether the host has specified Quick Chip operation in the Options field of Command 0x0300: Page 73 of 209 (D )

74 8 - Commands i) If Quick Chip operation is in effect: (1) The device immediately constructs its own preliminary ARPC Response, with tag 8A set to Z3, and sends the host Notification 0x Transaction Status / Progress Information, followed by Notification 0x Transaction Result Message, which contains transaction details the host should save for later verification. (2) The device sends the host Notification 0x Display Message Request with message REMOVE CARD to notify the cardholder the card can be removed, and ends the transaction. (3) The host should then process the ARQC Message data, including setting the final transaction amount, and should coordinate with the transaction processor to retrieve a final transaction result. ii) If Quick Chip operation is NOT in effect: (1) The host processes the ARQC Message data and uses it to coordinate with the transaction processor to receive an ARPC Response, which it processes and sends to the device using Extended Command 0x Online Processing Result / Acquirer Response (EMV Only, Extended Commands Only). (Contact Only) Alternatively, the host may implement host-driven Quick Chip by instead constructing its own preliminary ARPC Response with tag 8A set to Z3 and sending it to the device immediately, without waiting for a transaction processor response. The device responds by sending Notification 0x Display Message Request to the host with message DECLINED and ending the transaction. The host should suppress this message and take over the remainder of the transaction, including notifying the cardholder to remove the card, determining the final transaction amount, coordinating with the transaction processor to retrieve a final transaction result, and interacting with the cardholder. (2) The device communicates with the chip card to determine whether to approve or decline the transaction, and sends the host Notification 0x Display Message Request with message APPROVED or DECLINED to notify the cardholder of the transaction result. 12) The device sends the host Notification 0x Transaction Status / Progress Information, followed by Notification 0x Transaction Result Message, which contains transaction details the host should save for later verification. The transaction result message indicates whether the host must prompt the cardholder to provide a signature. 13) The host software optionally sends the device Command 0xA0 - Enable / Disable MSR Output (MSR Disable Only) to re-enable MSR data transmission. Page 74 of 209 (D )

75 8 - Commands Figure EMV Transaction Flow Page 75 of 209 (D )

tdynamo Secure Card Reader Programmer s Reference (COMMANDS) February 2018 Manual Part Number: D REGISTERED TO ISO 9001:2015

tdynamo Secure Card Reader Programmer s Reference (COMMANDS) February 2018 Manual Part Number: D REGISTERED TO ISO 9001:2015 tdynamo Secure Card Reader Programmer s Reference (COMMANDS) February 2018 Manual Part Number: D998200226-20 REGISTERED TO ISO 9001:2015 Page 1 of 268 (D998200226-20) Copyright 2006-2018 MagTek, Inc. Printed

More information

adynamo Technical Reference Manual PART NUMBER October 2014

adynamo Technical Reference Manual PART NUMBER October 2014 adynamo Technical Reference Manual PART NUMBER 99870002-2.02 October 2014 REGISTERED TO ISO 9001:2008 1710 Apollo Court Seal Beach, CA 90740 Phone: (562) 546-6400 FAX: (562) 546-6301 Technical Support:

More information

udynamo Troubleshooting Reference Manual PART NUMBER D October 2014

udynamo Troubleshooting Reference Manual PART NUMBER D October 2014 udynamo Troubleshooting Reference Manual PART NUMBER D99875706-20 October 2014 REGISTERED TO ISO 9001:2008 1710 Apollo Court Seal Beach, CA 90740 Phone: (562) 546-6400 FAX: (562) 546-6301 Technical Support:

More information

mdynamo OEM Secure Card Reader Authenticator Programmer s Reference (COMMANDS) July 2017 Manual Part Number: D REGISTERED TO ISO 9001:2008

mdynamo OEM Secure Card Reader Authenticator Programmer s Reference (COMMANDS) July 2017 Manual Part Number: D REGISTERED TO ISO 9001:2008 mdynamo OEM Secure Card Reader Authenticator Programmer s Reference (COMMANDS) July 2017 Manual Part Number: D998200151-21 REGISTERED TO ISO 9001:2008 Page 1 of 137 (D998200151-21) Copyright 2006-2017

More information

edynamo Secure Card Reader Authenticator Programmer s Reference (COMMANDS) October 2016 Manual Part Number: D REGISTERED TO ISO 9001:2008

edynamo Secure Card Reader Authenticator Programmer s Reference (COMMANDS) October 2016 Manual Part Number: D REGISTERED TO ISO 9001:2008 edynamo Secure Card Reader Authenticator Programmer s Reference (COMMANDS) October 2016 Manual Part Number: D998200115-11 REGISTERED TO ISO 9001:2008 MagTek I 1710 Apollo Court I Seal Beach, CA 90740 I

More information

MagneSafe OEM USB READER

MagneSafe OEM USB READER MagneSafe OEM USB READER TECHNICAL REFERENCE MANUAL PART NUMBER D99875494-52 JULY 2017 REGISTERED TO ISO 9001:2008 1710 Apollo Court Seal Beach, CA 90740 Phone: (562) 546-6400 FAX: (562) 546-6301 Technical

More information

udynamo Technical Reference Manual PART NUMBER OCTOBER 2014

udynamo Technical Reference Manual PART NUMBER OCTOBER 2014 udynamo Technical Reference Manual PART NUMBER 99875587-50 OCTOBER 2014 REGISTERED TO ISO 9001:2008 1710 Apollo Court Seal Beach, CA 90740 Phone: (562) 546-6400 FAX: (562) 546-6301 Technical Support: (651)

More information

MODEL MT-85 LOW COERCIVITY ENCODER/READER TECHNICAL REFERENCE MANUAL

MODEL MT-85 LOW COERCIVITY ENCODER/READER TECHNICAL REFERENCE MANUAL MODEL MT-85 LOW COERCIVITY ENCODER/READER TECHNICAL REFERENCE MANUAL Manual Part Number 99875107 Rev 5 NOVEMBER 2003 REGISTERED TO ISO 9001:2000 1710 Apollo Court Seal Beach, CA 90740 Phone: (562) 546-6400

More information

HALF CARD USB INSERTION READER TECHNICAL REFERENCE MANUAL

HALF CARD USB INSERTION READER TECHNICAL REFERENCE MANUAL HALF CARD USB INSERTION READER TECHNICAL REFERENCE MANUAL Manual Part Number 99875375 Rev 2 SEPTEMBER 2009 REGISTERED TO ISO 9001:2000 1710 Apollo Court Seal Beach, CA 90740 Phone: (562) 546-6400 FAX:

More information

edynamo Secure Card Reader Authenticator Installation and Operation Manual July 2017 Manual Part Number: D REGISTERED TO ISO 9001:2008

edynamo Secure Card Reader Authenticator Installation and Operation Manual July 2017 Manual Part Number: D REGISTERED TO ISO 9001:2008 edynamo Secure Card Reader Authenticator Installation and Operation Manual July 2017 Manual Part Number: D998200110-22 REGISTERED TO ISO 9001:2008 MagTek I 1710 Apollo Court I Seal Beach, CA 90740 I Phone:

More information

MAG-WEDGE READER INSTALLATION AND OPERATION MANUAL

MAG-WEDGE READER INSTALLATION AND OPERATION MANUAL MAG-WEDGE READER INSTALLATION AND OPERATION MANUAL Manual Part Number: 99821608 Rev 5 NOVEMBER 2005 REGISTERED TO ISO 9001:2000 20725 South Annalee Avenue Carson, CA 90746 Phone: (310) 631-8602 FAX: (310)

More information

Handheld PIN Pad Device with MSR/Contact/Contactless Programmer s Manual (COMMANDS)

Handheld PIN Pad Device with MSR/Contact/Contactless Programmer s Manual (COMMANDS) DynaPro Go Handheld PIN Pad Device with MSR/Contact/Contactless Programmer s Manual (COMMANDS) August 2018 Document Number: D998200136-20 REGISTERED TO ISO 9001:2015 MagTek I 1710 Apollo Court I Seal Beach,

More information

udynamo, Dynamag, DynaMAX, edynamo, mdynamo, BulleT

udynamo, Dynamag, DynaMAX, edynamo, mdynamo, BulleT udynamo, Dynamag, DynaMAX, edynamo, mdynamo, BulleT SCRA Devices macos MTSCRA Demo Guide February 2017 Manual Part Number: D998200174-10 REGISTERED TO ISO 9001:2008 MagTek I 1710 Apollo Court I Seal Beach,

More information

DynaPro Go. Secure PIN Entry Device PCI PTS POI Security Policy. September Document Number: D REGISTERED TO ISO 9001:2008

DynaPro Go. Secure PIN Entry Device PCI PTS POI Security Policy. September Document Number: D REGISTERED TO ISO 9001:2008 DynaPro Go Secure PIN Entry Device PCI PTS POI Security Policy September 2017 Document Number: D998200217-11 REGISTERED TO ISO 9001:2008 MagTek I 1710 Apollo Court I Seal Beach, CA 90740 I Phone: (562)

More information

MODEL MT RS-232 INSERTION READER TECHNICAL REFERENCE MANUAL

MODEL MT RS-232 INSERTION READER TECHNICAL REFERENCE MANUAL MODEL MT-215232 RS-232 INSERTION READER TECHNICAL REFERENCE MANUAL Manual Part Number 99821504 Rev 6 APRIL 2003 REGISTERED TO ISO 9001:2000 20725 South Annalee Avenue Carson, CA 90746 Phone: (310) 631-8602

More information

P-SERIES, PORT POWERED INSERTION READER TECHNICAL REFERENCE MANUAL

P-SERIES, PORT POWERED INSERTION READER TECHNICAL REFERENCE MANUAL P-SERIES, PORT POWERED INSERTION READER TECHNICAL REFERENCE MANUAL Manual Part Number 99875158 Rev 12 SEPTEMBER 2009 REGISTERED TO ISO 9001:2000 1710 Apollo Court Seal Beach, CA 90740 Phone: (562) 546-6400

More information

tdynamo Three-way Secure Card Reader Authenticator Installation and Operation Manual November 2018 Document Number: D

tdynamo Three-way Secure Card Reader Authenticator Installation and Operation Manual November 2018 Document Number: D tdynamo Three-way Secure Card Reader Authenticator Installation and Operation Manual November 2018 Document Number: D998200257-21 REGISTERED TO ISO 9001:2015 MagTek I 1710 Apollo Court I Seal Beach, CA

More information

MagneSafe I-65 INSERTION READER TECHNICAL REFERENCE MANUAL

MagneSafe I-65 INSERTION READER TECHNICAL REFERENCE MANUAL MagneSafe I-65 INSERTION READER TECHNICAL REFERENCE MANUAL Manual Part Number: 99875541 Rev 8 FEBRUARY 2012 REGISTERED TO ISO 9001:2008 1710 Apollo Court Seal Beach, CA 90740 Phone: (562) 546-6400 FAX:

More information

DynaPro Mini. PIN Encryption Device Installation and Operation Manual. June Manual Part Number: REGISTERED TO ISO 9001:2008

DynaPro Mini. PIN Encryption Device Installation and Operation Manual. June Manual Part Number: REGISTERED TO ISO 9001:2008 DynaPro Mini PIN Encryption Device Installation and Operation Manual June 2014 Manual Part Number: 99875642-1.02 REGISTERED TO ISO 9001:2008 MagTek I 1710 Apollo Court I Seal Beach, CA 90740 I Phone: (562)

More information

USB HID SURESWIPE & USB HID SWIPE READER TECHNICAL REFERENCE MANUAL

USB HID SURESWIPE & USB HID SWIPE READER TECHNICAL REFERENCE MANUAL USB HID SURESWIPE & USB HID SWIPE READER TECHNICAL REFERENCE MANUAL Manual Part Number 99875191 Rev 11 MARCH 2007 REGISTERED TO ISO 9001:2000 20725 South Annalee Avenue Carson, CA 90746 Phone: (310) 631-8602

More information

IntelliStripe 320 MOTORIZED READER TECHNICAL REFERENCE MANUAL

IntelliStripe 320 MOTORIZED READER TECHNICAL REFERENCE MANUAL IntelliStripe 320 MOTORIZED READER TECHNICAL REFERENCE MANUAL Manual Part Number: 99875167 Rev 17 OCTOBER 2012 REGISTERED TO ISO 9001:2008 1710 Apollo Court Seal Beach, CA 90740 Phone: (562) 546-6400 FAX:

More information

2DScan TM Barcode Scanner

2DScan TM Barcode Scanner 2DScan TM Barcode Scanner Quick Start Manual Default Check Version FCC WARNING STATEMENT This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part

More information

Rev. C 8/16/2017. VP3300/VP3300C/VP3300E User Manual

Rev. C 8/16/2017. VP3300/VP3300C/VP3300E User Manual 80149509-001 Rev. C 8/16/2017 VP3300/VP3300C/VP3300E User Manual Copyright 2017, ID TECH. All rights reserved. ID TECH 10721 Walker Street Cypress, CA 90630 USA This document, as well as the software and

More information

CHS 7Ci. Bluetooth Cordless Barcode Scanner. Quick Start Guide

CHS 7Ci. Bluetooth Cordless Barcode Scanner.  Quick Start Guide Quick Start Guide CHS 7Ci Bluetooth Cordless Barcode Scanner www.socketmobile.com PACKAGE CONTENTS Product Information Product label Blue/Green/Red LED Scanner head Trigger button CHS 7Ci Lanyard NiMH

More information

DynaPro Go. Handheld PIN Pad Device with MSR/Contact/Contactless Installation and Operation Manual. August Document Number: D

DynaPro Go. Handheld PIN Pad Device with MSR/Contact/Contactless Installation and Operation Manual. August Document Number: D DynaPro Go Handheld PIN Pad Device with MSR/Contact/Contactless Installation and Operation Manual August 2018 Document Number: D998200129-11 REGISTERED TO ISO 9001:2015 MagTek I 1710 Apollo Court I Seal

More information

User Manual. Spectrum Pro

User Manual. Spectrum Pro 80140502-001 User Manual Spectrum Pro PCI PTS 4.X Hybrid Insert Reader RS232 Interface 80140502-001 Rev 51 3/10/2015 International Technologies & Systems Corporation 10721 Walker Street, Cypress, CA 90630-4720;

More information

INSTALLATION AND OPERATIONS MANUAL

INSTALLATION AND OPERATIONS MANUAL UNIPORT USB to PS/2 converter INSTALLATION AND OPERATIONS MANUAL 10707 Stancliff Road Houston, Texas 77099 Phone: (281) 933-7673 Internet: WWW.ROSE.COM LIMITED WARRANTY Rose Electronics warrants the Uniport

More information

Messager USB by Nel-Tech Labs, Inc. Installation & User Manual

Messager USB by Nel-Tech Labs, Inc. Installation & User Manual Messager USB by Nel-Tech Labs, Inc. Installation & User Manual Index: Introduction... 3 Messager USB Layout Summary... Installation... Message Programming & Operation... Troubleshooting... 4 5 6 6 Warranty

More information

CAUTION: Before installing the Windows or Macintosh operating system, see our knowledge base answer ID 1485 for precautionary procedures.

CAUTION: Before installing the Windows or Macintosh operating system, see our knowledge base answer ID 1485 for precautionary procedures. Quick Start Guide Getting Started Kit Contents USB external drive USB cable AC adapter Quick Install Guide USB External Drive AC Adapter USB Cable Quick Install Guide Compatibility CAUTION: Before installing

More information

User Guide. USB/Ethernet Charging Cradle. Mobility Electronics, Inc Via Pasar, San Diego, CA 92126, USA

User Guide. USB/Ethernet Charging Cradle. Mobility Electronics, Inc Via Pasar, San Diego, CA 92126, USA USB/Ethernet Charging Cradle 9918 Via Pasar, San Diego, CA 92126, USA User Guide Phone: (858) 880-2225 Fax: (858) 530-2733 www.invisioncradles.com Copyright 2006. All rights reserved. The information in

More information

PETROL (P-SERIES), TTL, INSERTION READER TECHNICAL REFERENCE MANUAL

PETROL (P-SERIES), TTL, INSERTION READER TECHNICAL REFERENCE MANUAL PETROL (P-SERIES), TTL, INSERTION READER TECHNICAL REFERENCE MANUAL Manual Part Number 99875139 Rev 8 MAY 2003 REGISTERED TO ISO 9001:2000 20725 South Annalee Avenue Carson, CA 90746 Phone: (310) 631-8602

More information

USB 3.0 Spectra

USB 3.0 Spectra USB 3.0 Spectra 3001-15 1-Port USB 3.0 15m Active Extension Cable User Guide Thank you for purchasing the Icron USB 3.0 Spectra 3001-15. Please read this guide thoroughly. This document applies to Part

More information

Installation Guide. Wyse Rx0L Thin Client Flash and RAM Upgrade Option Kit. Issue: PN: L Rev. A

Installation Guide. Wyse Rx0L Thin Client Flash and RAM Upgrade Option Kit. Issue: PN: L Rev. A Installation Guide Wyse Rx0L Thin Client Flash and RAM Upgrade Option Kit Issue: 052209 PN: 883884-11L Rev. A ii Copyright Notice 2009, Wyse Technology Inc. All rights reserved. This manual and the software

More information

1D IMAGER USER GUIDESERIES 7. Model shown: CHS 7Ci. Bluetooth Barcode Scanner. CHS 7Ci & 7Di.

1D IMAGER USER GUIDESERIES 7. Model shown: CHS 7Ci. Bluetooth Barcode Scanner. CHS 7Ci & 7Di. 1D IMAGER USER GUIDESERIES 7 Model shown: CHS 7Ci Bluetooth Barcode Scanner CHS 7Ci & 7Di www.socketmobile.com PACKAGE CONTENTS Scanner 7Ci/7Di Lanyard NiMH rechargeable batteries AC adapter* & USB to

More information

TELink FLASH. Model 700a. Installation and Operation Instructions. Magic On Hold is a Registered Service Mark and Trademark of Avaya Communications

TELink FLASH. Model 700a. Installation and Operation Instructions. Magic On Hold is a Registered Service Mark and Trademark of Avaya Communications TELink FLASH Model 700a Installation and Operation Instructions Magic On Hold is a Registered Service Mark and Trademark of Avaya Communications Issue 1, 8/01 Printed in USA FCC Notice WARNING: This equipment

More information

SREDKey PCI 3.0 Encrypted Key Pad with MagStripe Card Reader USB Interface QuickStart Manual

SREDKey PCI 3.0 Encrypted Key Pad with MagStripe Card Reader USB Interface QuickStart Manual SREDKey PCI 3.0 Encrypted Key Pad with MagStripe Card Reader USB Interface QuickStart Manual AGENCY APPROVED Specifications for subpart B of part 15 of FCC rule for a Class A computing device. LIMITED

More information

TELink 700 FLASH INSTALLATION AND OPERATION MANUAL

TELink 700 FLASH INSTALLATION AND OPERATION MANUAL TELink 700 FLASH INSTALLATION AND OPERATION MANUAL Attention: A telco line surge protector should be used in series with the line connected to this unit. Please leave this manual with the unit after installation

More information

Secure Card Reading and PIN Solutions

Secure Card Reading and PIN Solutions Secure Card Reading and PIN Solutions When it comes to Card Reader security and reliability MagneSafe Secure Card Readers & PIN Pads Merchants and retailers both online and in-store rely on MagTek. MagTek

More information

Introduction. Package Contents. System Requirements

Introduction. Package Contents. System Requirements VP6230 Page 1 Page 2 Introduction Congratulations on your purchase of the Blu-Link Folding Bluetooth Keyboard. This innovative portable folding keyboard connects via Bluetooth technology to provide a wireless

More information

Sonorous v2.0. Installation & User Manual

Sonorous v2.0. Installation & User Manual Sonorous v2.0 Installation & User Manual Audio Messaging Solutions, LLC 720 Brooker Creek Blvd., Ste. 215 Oldsmar, FL 34677 800.584.HOLD (4653) Fax: 727.785.7659 http://onholdbusiness.com info@onholdbusiness.com

More information

Operating and Storage Temperature 5 General Warnings 6. Extracting Data 8 WARRANTY AND LEGAL

Operating and Storage Temperature 5 General Warnings 6. Extracting Data 8 WARRANTY AND LEGAL M E D I A M O D U L E M M - 0 1 M A K I N G V I R T U A L R E A L I T Y Index WARNINGS Operating and Storage Temperature 5 General Warnings 6 BASICS Extracting Data 8 WARRANTY AND LEGAL Warranty 10-12

More information

BTScan. Quick Start Manual. ID TECH Walker Street (714) P/N: Rev.B

BTScan. Quick Start Manual. ID TECH Walker Street (714) P/N: Rev.B BTScan TM Quick Start Manual ID TECH 10721 Walker Street (714) 761-6368 www.idtechproducts.com P/N: 80126501-001 Rev.B FCC WARNING STATEMENT This equipment has been tested and found to comply with the

More information

SecureMag Encrypted MagStripe Reader

SecureMag Encrypted MagStripe Reader SecureMag Encrypted MagStripe Reader USB-CDC Interface QuickStart Manual AGENCY APPROVED Specifications for subpart B of part 15 of FCC rule for a Class A computing device. LIMITED WARRANTY ID TECH warrants

More information

USB Ranger 110/410 User Guide

USB Ranger 110/410 User Guide USB Ranger 110/410 User Guide Featuring ExtremeUSB Technology USB Ranger 110/410 Thank you for purchasing the USB Ranger. Please read this guide thoroughly before installation. This document applies to

More information

INTELLISTRIPE 380 COMMAND REFERENCE MANUAL

INTELLISTRIPE 380 COMMAND REFERENCE MANUAL INTELLISTRIPE 380 COMMAND REFERENCE MANUAL Manual Part Number 99875217 Rev 6 FEBRUARY 2009 REGISTERED TO ISO 9001:2000 1710 Apollo Court Seal Beach, CA 90740 Phone: (562) 546-6400 FAX: (562) 546-6301 Technical

More information

TB2DOCK4KDHC. Thunderbolt 2 4K Laptop Docking Station - TB Cable Included

TB2DOCK4KDHC. Thunderbolt 2 4K Laptop Docking Station - TB Cable Included Thunderbolt 2 4K Laptop Docking Station - TB Cable Included TB2DOCK4KDHC *actual product may vary from photos DE: Bedienungsanleitung - de.startech.com FR: Guide de l'utilisateur - fr.startech.com ES:

More information

ilink Installation & User Manual Internet Downloadable MP3 Music & Message Series

ilink Installation & User Manual Internet Downloadable MP3 Music & Message Series ilink by Installation & User Manual ilink Magic On Hold 800.584.4653 Internet Downloadable MP3 Music & Message Series Magic On Hold 720 Brooker Creek Blvd., Ste. 215 Oldsmar, FL 34677 800.584.HOLD (4653)

More information

USER S MANUAL MODEL VP6630

USER S MANUAL MODEL VP6630 USER S MANUAL MODEL VP6630 Regulatory Compliance This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference,

More information

PIN Entry & Management

PIN Entry & Management PIN Entry & Management From PIN selection to PIN verification Card issuers and merchants know they can put their trust in MagTek. Whether meeting the growing need for instant, in-branch card and PIN issuance

More information

RFID UHF READER U100 ARKSCAN. RFID/UHF READER (Model: U100) User Manual V Arkscan, LLC. All rights reserved.

RFID UHF READER U100 ARKSCAN. RFID/UHF READER (Model: U100) User Manual V Arkscan, LLC. All rights reserved. 1 ARKSCAN RFID/UHF READER (Model: U100) User Manual V 1.0 www.arkscan.com 2017-2018 Arkscan, LLC. All rights reserved. 2 All rights reserved. No parts of this work may be reproduced in any form or by any

More information

Installer/User Guide

Installer/User Guide Installer/User Guide Avocent Corporation 4991 Corporate Drive Huntsville, Alabama 35805-6201 USA 256-430-4000 (Fax) 256-430-4030 http://www.avocent.com FCC Notification Warning: Changes or modifications

More information

USB Audio Converter. Installation and Operation Manual. USB to Analog Audio Converter Stancliff Road Houston, Texas 77099

USB Audio Converter. Installation and Operation Manual. USB to Analog Audio Converter Stancliff Road Houston, Texas 77099 USB Audio Converter USB to Analog Audio Converter Installation and Operation Manual 10707 Stancliff Road Houston, Texas 77099 Phone: (281) 933-7673 techsupport@rose.com LIMITED WARRANTY Rose Electronics

More information

Messager USB w/ Night Answer

Messager USB w/ Night Answer Messager USB w/ Night Answer Digital Messaging System Installation & Users Guide Attention! Some USB drives have indicator LEDs - These LEDs may blink slow, fast, or may stay solid during playback. Any

More information

Secure Card Reader Authenticators

Secure Card Reader Authenticators Secure Card Reader Authenticators The Evolution of Card Reading Technology: MagneSafe technology has evolved exponentially from its inception in 2006 when it delivered the industry s first secure card

More information

XGPS150 OWNER'S MANUAL

XGPS150 OWNER'S MANUAL OWNER'S MANUAL Universal GPS Receiver Introduction Thank you for purchasing the XGPS150 Universal Bluetooth GPS Receiver from Dual Electronics. The XGPS150 works with signals from GPS satellites to determine

More information

Secure Card Reader Authenticators

Secure Card Reader Authenticators Secure Card Reader Authenticators When it comes to card reading security and reliability Merchants, retailers and financial institutions rely on MagTek. Secure card reader authenticators (SCRAs) capture

More information

USB Ranger 422 User Guide

USB Ranger 422 User Guide USB Ranger 422 User Guide Featuring ExtremeUSB Technology USB Ranger 422 Thank you for purchasing the USB Ranger. Please read this guide thoroughly before installation. This document applies to Part Numbers:

More information

McPC/Giga-MediaLinX. (PCI and Low Profile PCI Version) 10/100/1000 Mbps. Operation Manual

McPC/Giga-MediaLinX. (PCI and Low Profile PCI Version) 10/100/1000 Mbps. Operation Manual McPC/Giga-MediaLinX (PCI and Low Profile PCI Version) 10/100/1000 Mbps Operation Manual FCC Radio Frequency Interference Statement This equipment has been tested and found to comply with the limits for

More information

INSTALLATION AND OPERATIONS MANUAL

INSTALLATION AND OPERATIONS MANUAL CrystalLink USB 2.0 Fiber USB Fiber Extender INSTALLATION AND OPERATIONS MANUAL Part Number CLK-4U2FM-500M CLK-4U2FS-10KM 10707 Stancliff Road Phone: (281) 933-7673 Houston, Texas 77099 WWW.ROSE.COM LIMITED

More information

USB Server User Manual

USB Server User Manual 1 Copyright Notice Copyright Incorporated 2009. All rights reserved. Disclaimer Incorporated shall not be liable for technical or editorial errors or omissions contained herein; nor for incidental or consequential

More information

Bluetooth USB Adapter TALUS. User Guide

Bluetooth USB Adapter TALUS. User Guide Bluetooth USB Adapter TALUS User Guide Revision 0.1 1 User Guide for the TALUS Revision 1.0.1 Firmware version 1.0.X Printed in Korea Copyright Copyright 2008, SystemBase Co., Ltd. All rights reserved.

More information

CrystalLink USB 2.0 CAT5 INSTALLATION AND OPERATIONS MANUAL. Part Number CLK-1U4TP-100M/PE Stancliff Road Phone: (281)

CrystalLink USB 2.0 CAT5 INSTALLATION AND OPERATIONS MANUAL. Part Number CLK-1U4TP-100M/PE Stancliff Road Phone: (281) CrystalLink USB 2.0 CAT5 USB CAT5 Extender INSTALLATION AND OPERATIONS MANUAL Part Number CLK-1U4TP-100M/PE 10707 Stancliff Road Phone: (281) 933-7673 Houston, Texas 77099 WWW.ROSE.COM LIMITED WARRANTY

More information

Monarch 9414 Printer. TC9414EM 7/99 Rev. AB 1999 Monarch Marking Systems, Inc. All rights reserved.

Monarch 9414 Printer. TC9414EM 7/99 Rev. AB 1999 Monarch Marking Systems, Inc. All rights reserved. Monarch 9414 Printer TC9414EM 7/99 Rev. AB 1999 Monarch Marking Systems, Inc. All rights reserved. Each product and program carries a respective written warranty, the only warranty on which the customer

More information

ilink LCD/iLink LCD Wireless Installation & User Manual

ilink LCD/iLink LCD Wireless Installation & User Manual ilink LCD/iLink LCD Wireless Installation & User Manual Index: Introduction... 3 ilink Layout Summary... 4-5 LCD Layout Summary... 6-8 Web Browser... 9 Installation... 10-12 Connectivity Test/Volume Adjustments...

More information

Mobile UHF Reader. Quick Guide. For full user s manual, please contact your local distributor. Mobile UHF Reader Quick Guide (Rev2) P/N:

Mobile UHF Reader. Quick Guide. For full user s manual, please contact your local distributor. Mobile UHF Reader Quick Guide (Rev2) P/N: Mobile UHF Reader Quick Guide For full user s manual, please contact your local distributor. Mobile UHF Reader Quick Guide (Rev2) P/N: 8012-0064001 FCC WARNING STATEMENT This equipment has been tested

More information

Multi-Messager USB by Nel-Tech Labs, Inc. Installation & User Manual

Multi-Messager USB by Nel-Tech Labs, Inc. Installation & User Manual Multi-Messager USB by Nel-Tech Labs, Inc. Installation & User Manual Index: Introduction... 3 Multi-Messager USB Layout Summary... 4-5 Installation... 6-9 Message Programming & Operation... 10 Warranty

More information

What s in the box. SUP paddle sensor. Paddle sensor mounting track. Charger. USB cable. In your Motionize SUP kit you will find:

What s in the box. SUP paddle sensor. Paddle sensor mounting track. Charger. USB cable. In your Motionize SUP kit you will find: User's Manual 1 What s in the box In your Motionize SUP kit you will find: SUP paddle sensor Paddle sensor mounting track Charger USB cable 2 Android & ios Requirements Android 5 or newer. iphone 5 or

More information

About MagTek. Secure Card Reader Authenticators

About MagTek. Secure Card Reader Authenticators About MagTek Since 1972, MagTek has been a leading manufacturer of electronic devices and systems for the reliable issuance, reading, transmission and security of cards, checks, PINs and other identification

More information

MICRSAFE TECHNICAL REFERENCE MANUAL

MICRSAFE TECHNICAL REFERENCE MANUAL MICRSAFE TECHNICAL REFERENCE MANUAL Manual Part Number: 99875466-3 OCTOBER 2010 REGISTERED TO ISO 9001:2008 1710 Apollo Court Seal Beach, CA 90740 Phone: (562) 546-6400 FAX: (562) 546-6301 Technical Support:

More information

New MINIMAG Magnetic Stripe Reader

New MINIMAG Magnetic Stripe Reader TM New MINIMAG Magnetic Stripe Reader USB/HID Interface Quickstart Manual ID TECH 10721 Walker Street Cypress, California 90630 (714) 761-6368 www.idtechproducts.com 80066510-001 Rev. C R04/06 #413 HID

More information

DIGIT III Manual. Manual Version 1.3

DIGIT III Manual. Manual Version 1.3 DIGIT III Manual The AirTurn DIGIT III is an 8-button rechargeable Bluetooth multi-function remote control. The DIGIT III works with most Bluetooth 4.0 tablets and computers, including PC, Mac, Android

More information

Data Capture for Workforce in Motion. D-Fly User Guide. Baracoda TM February 2010

Data Capture for Workforce in Motion. D-Fly User Guide. Baracoda TM February 2010 D-Fly User Guide Baracoda TM February 2010 SUMMARY SUMMARY 2 REVISION HISTORY 3 INTRODUCTION 4 1. STYLUS 5 2. BATTERY 5 3. SWITCHING ON THE READER 5 4. QUICK START UP GUIDE 6 4.1. HOW TO READ BARCODES

More information

Thunderbolt 3 to Dual DP Adapter - 4K 60 Hz

Thunderbolt 3 to Dual DP Adapter - 4K 60 Hz Thunderbolt 3 to Dual DP Adapter - 4K 60 Hz TB32DP2 *actual product may vary from photos FR: Guide de l utilisateur - fr.startech.com DE: Bedienungsanleitung - de.startech.com ES: Guía del usuario - es.startech.com

More information

PTT- Z or PTT-AZ or PTT-UX-AZ PUSH-TO-TALK USER GUIDE

PTT- Z or PTT-AZ or PTT-UX-AZ PUSH-TO-TALK USER GUIDE Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits

More information

USB-C Dual-4K Monitor Docking Station for Laptops - Power Delivery

USB-C Dual-4K Monitor Docking Station for Laptops - Power Delivery USB-C Dual-4K Monitor Docking Station for Laptops - Power Delivery DK30CHDDPPD DK30CHDPPDUE *actual product may vary from photos FR: Guide de l utilisateur - fr.startech.com DE: Bedienungsanleitung - de.startech.com

More information

USB Ranger Fiber Optic USB 2.0 Extender. User Guide

USB Ranger Fiber Optic USB 2.0 Extender. User Guide USB Ranger 2224 Fiber Optic USB 2.0 Extender User Guide Thank you for purchasing the USB Ranger 2224. Please read this guide thoroughly. This document applies to Part Numbers: 00-00260, 00-00261, 00-00262,

More information

Card Issuance/Encoding & PIN Pads

Card Issuance/Encoding & PIN Pads Card Issuance/Encoding & PIN Pads From Card Issuance to Card Security Card Issuance/Encoding & PIN Pads Card issuers know they can put their trust in Mag- Tek. Whether meeting the growing need for instant,

More information

Terminal I/O Profile Client Implementation Guide

Terminal I/O Profile Client Implementation Guide [04.2016] Terminal I/O Profile Client Implementation Guide 30507ST10753A Rev. 6 2017-08-16 Mod. 0809 2016-08 Rev.7 SPECIFICATIONS ARE SUBJECT TO CHANGE WITHOUT NOTICE NOTICE While reasonable efforts have

More information

Universal Charge & Sync Cabinet for Tablets/iPads - 10 Slot Charging Station with Lock and Fan

Universal Charge & Sync Cabinet for Tablets/iPads - 10 Slot Charging Station with Lock and Fan Universal Charge & Sync Cabinet for Tablets/iPads - 10 Slot Charging Station with Lock and Fan ST10CSU2A * This page is an addendum to the warning label found on the product. The Warning Label (250V/5A)

More information

Encrypted TLVs in Augusta

Encrypted TLVs in Augusta Tech Note #010 Encrypted TLVs in Augusta Rev. A Revised 10/03/2016 International Technologies & Systems Corporation 10721 Walker Street, Cypress, CA 90630-4720; Tel: (714) 761-6368; Fax (714) 761-8880

More information

External Portable. HP SimpleSave. Portable Hard Drive User Manual. SimpleSave

External Portable. HP SimpleSave. Portable Hard Drive User Manual. SimpleSave HP SimpleSave Portable Hard Drive User Manual External Portable SimpleSave Getting Help For additional help with your drive, its installation, and the software, contact one of the following: HP Customer

More information

Secure Card Reader Authenticators

Secure Card Reader Authenticators Secure Card Reader Authenticators When it comes to card reading security and reliability Merchants, retailers and financial institutions rely on MagTek. Secure card reader authenticators (SCRAs) capture

More information

IE-MediaChassis/1. Operation Manual

IE-MediaChassis/1. Operation Manual IE-MediaChassis/1 Operation Manual FCC Radio Frequency Interference Statement This equipment has been tested and found to comply with the limits for a Class B computing device, pursuant to Part 15 of the

More information

USB 2.0 Ranger Port USB m CAT 5e/6/7 Extender System. User Guide

USB 2.0 Ranger Port USB m CAT 5e/6/7 Extender System. User Guide USB 2.0 Ranger 2304 4-Port USB 2.0 100m CAT 5e/6/7 Extender System User Guide Thank you for purchasing the USB 2.0 Ranger 2304. Please read this guide thoroughly. This document applies to Part Numbers:

More information

WILDCAT REALIZM 800 WILDCAT REALIZM 500 WILDCAT REALIZM 200 WILDCAT REALIZM 100

WILDCAT REALIZM 800 WILDCAT REALIZM 500 WILDCAT REALIZM 200 WILDCAT REALIZM 100 3DLABS WILDCAT REALIZM INSTALLATION GUIDE WILDCAT REALIZM 800 WILDCAT REALIZM 500 WILDCAT REALIZM 200 WILDCAT REALIZM 100 85-000057-001 (Rev B) Copyright 2005 by 3Dlabs A Creative Company 3Dlabs and Wildcat

More information

Z-Wave Plus Smart Switch Dual Rocker. Installation Guide Ecolink Intelligent Technology Inc. PN DDLS2-ZWAVE5. A Universal Electronics Company

Z-Wave Plus Smart Switch Dual Rocker. Installation Guide Ecolink Intelligent Technology Inc. PN DDLS2-ZWAVE5. A Universal Electronics Company Z-Wave Plus Smart Switch Dual Rocker A Universal Electronics Company Installation Guide Product Overview Easily automate overhead lights, table lamps or other accessories with the Ecolink Z-Wave Plus Smart

More information

USB ClassicKeyboard User Manual Guide d utilisation du

USB ClassicKeyboard User Manual Guide d utilisation du En Ca USB ClassicKeyboard User Manual Guide d utilisation du ClassicKeyboard USB Manual de usuario del ClassicKeyboard USB USB ClassicKeyboard Manual do Usuário Es Po P73257 F8E206-USB Table of Contents

More information

DX-C USER GUIDE

DX-C USER GUIDE PC/Mac USB File Transfer Adapter DX-C114200 USER GUIDE 2 3 Dynex DX-C114200 PC/Mac USB File Transfer Adapter Contents Important safety instructions...3 Introduction...4 Features...5 Package Contents...5

More information

GageWay KW Keyboard Wedge

GageWay KW Keyboard Wedge All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording, taping, or information storage and retrieval

More information

Thunderbolt 3 Dual DisplayPort Mini Bus Powered Docking Station for Laptops - 4K 60Hz - GbE - USB-3.0

Thunderbolt 3 Dual DisplayPort Mini Bus Powered Docking Station for Laptops - 4K 60Hz - GbE - USB-3.0 Thunderbolt 3 Dual DisplayPort Mini Bus Powered Docking Station for Laptops - 4K 60Hz - GbE - USB-3.0 TB3DKM2DP *actual product may vary from photos FR: Guide de l utilisateur - fr.startech.com DE: Bedienungsanleitung

More information

H-UC232S USB Serial Converter

H-UC232S USB Serial Converter H-UC232S USB Serial Converter FCC Warning This equipment has been tested and found to comply with the regulations for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed

More information

Technical Reference Guide

Technical Reference Guide ios Bluetooth TM Printer Technical Reference Guide Part Names and Functions Describes the buttons and LEDs of interface board. Connecting to ios Devices Describes how to connect ios devices. Application

More information

User s Manual. Bluetooth Slim Keyboard. Page

User s Manual. Bluetooth Slim Keyboard. Page User s Manual Bluetooth Slim Keyboard Page Regulatory Compliance This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause

More information

Enterprise Call Manager

Enterprise Call Manager Enterprise Call Manager Installation & Operation Manual Please leave this manual with the unit after installation Enterprise Call Manager Rev 1.7 Draft Rev. 10/11/2001 INTRODUCTION SYSTEM DESCRIPTION The

More information

Installation and Configuration

Installation and Configuration Access Serial Ports Driver (ASPS) Windows driver for USB HID devices Installation and Configuration Version 1.6 July 2014 www.access-is.com Contents 1. Acronyms... 3 2. Introduction... 4 2.1. Supported

More information

Mini Wireless Barcode Reader Quick Guide

Mini Wireless Barcode Reader Quick Guide Mini Wireless Barcode Reader Quick Guide Full user s manual is available on the enclosed CD. Mini Wireless Barcode Reader Quick Guide P/N: 8002-0028*00 FCC WARNING STATEMENT This equipment has been tested

More information

Bluetooth Stereo Headset

Bluetooth Stereo Headset Bluetooth Stereo Headset RF-BTHP01 User Guide Bluetooth Stereo Headset Contents Features... 3 Package contents... 3 Components... 4 Using your headset... 5 Charging the battery... 5 Turning your headset

More information

QwickCards.com. Instant Issuance Card Personalization System Installation and Operation Manual. August Document Part Number: D

QwickCards.com. Instant Issuance Card Personalization System Installation and Operation Manual. August Document Part Number: D QwickCards.com Instant Issuance Card Personalization System Installation and Operation Manual August 2017 Document Part Number: D99875517-60 REGISTERED TO ISO 9001:2008 MagTek I 1710 Apollo Court I Seal

More information

Tapio User Guide. ios and USB Switch Interface.

Tapio User Guide. ios and USB Switch Interface. Tapio User Guide ios and USB Switch Interface Origin Instruments Corporation 854 Greenview Dr. Grand Prairie, TX 75050 USA Voice: 972-606-8740 Fax: 972-606-8741 Email: support@orin.com Web: www.orin.com

More information

Thunderbolt 3 Dual-4K Docking Station for Laptops - Windows Only

Thunderbolt 3 Dual-4K Docking Station for Laptops - Windows Only Thunderbolt 3 Dual-4K Docking Station for Laptops - Windows Only TB3DK2DPW TB3DK2DPWUE *actual product may vary from photos FR: Guide de l utilisateur - fr.startech.com DE: Bedienungsanleitung - de.startech.com

More information